WO2019037736A1 - 传输方法、终端设备和网络设备 - Google Patents

传输方法、终端设备和网络设备 Download PDF

Info

Publication number
WO2019037736A1
WO2019037736A1 PCT/CN2018/101696 CN2018101696W WO2019037736A1 WO 2019037736 A1 WO2019037736 A1 WO 2019037736A1 CN 2018101696 W CN2018101696 W CN 2018101696W WO 2019037736 A1 WO2019037736 A1 WO 2019037736A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
terminal device
resource
network device
transmission resource
Prior art date
Application number
PCT/CN2018/101696
Other languages
English (en)
French (fr)
Inventor
丁志明
杜振国
韩云博
庄宏成
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201711479657.0A external-priority patent/CN109429353B/zh
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2019037736A1 publication Critical patent/WO2019037736A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W72/00Local resource management
    • H04W72/12Wireless traffic scheduling

Definitions

  • the present application relates to the field of communications, and more particularly to a transmission method, a terminal device, and a network device.
  • the 5 th Generation, 5G wireless communications standard in order to support high reliability and low latency (Ultra-Reliability Low Latency Communication, URLLC) business, proposes the use of unlicensed (Grant free) transmission technology. That is, the network device pre-arranges a shared Contention-based Transmission Area (CTA), which appears in each unauthorized transmission period, and the terminal device immediately has an unauthorized license when there is data transmission.
  • CTA Contention-based Transmission Area
  • One or more Contention-based Transmission Units (CTUs) are randomly selected in the CTA of the transmission period to transmit data. Since the terminal device does not request the network device to allocate resources before transmitting the data, this transmission technology may be referred to as an unlicensed transmission.
  • the terminal device can use the K-repetitive transmission technology, that is, transmit the same data in consecutive K unauthorized transmission periods, where K ⁇ 2 and K is an integer. However, even if it is transmitted continuously for K times, successful transmission cannot be guaranteed. Therefore, when the network device determines that the terminal device is performing the unlicensed transmission but cannot correctly receive the data of the terminal device, or after the terminal device performs K times of unauthorized transmission, and the network device cannot correctly receive the data of the terminal device, The network device needs to authorize transmission resources to the terminal device in time to reliably retransmit the data to be transmitted. This process is called an unauthorized transfer-to-authorization (Grant free to Grant-based, GF2GB).
  • Grant free to Grant-based GF2GB
  • the present application provides a transmission method, a terminal device, and a network device, which can achieve the purpose of fast transfer authorization transmission after the unauthorized transmission fails.
  • a transmission method includes: receiving, by a terminal device, a first authorization message sent by a network device, where the first authorization message is that the network device detects that the terminal device is authorized to transmit the first After the data fails, the terminal device is authorized to transmit a message of the resource, where the first authorization message includes resource indication information, the resource indication information is used to indicate the first transmission resource, and the first transmission resource is used for the terminal device. Continuously using a plurality of times to transmit the first data;
  • the terminal device sends second data to the network device on the first transmission resource, where the second data is part or all of the first data.
  • the first transmission resource is used by the terminal device to use the first data multiple times. It can be understood that the first transmission resource is a periodic resource, and if the size of the first transmission resource can be transmitted first. All of the data is transmitted on the first transmission resource, and if the size of the first transmission resource can only transmit a part of the first data, a part of the first data is transmitted on the first transmission resource, and then The remaining portion of the first data is continued to be transmitted using the first transmission resource in the next transmission cycle. Alternatively, if all or a part of the first data fails to be transmitted, the terminal device may continue to retransmit all or part of the first data using the first transmission resource in the next transmission period.
  • the first transmission resource may also be used to transmit other data different from the first data, which is not limited by the embodiment of the present application.
  • the network device can immediately authorize the transmission resource to the terminal device by using the first authorization message, so that the terminal device can use the transmission resource to transmit the data of the unauthorized transmission failure.
  • the purpose of fast transfer authorization transfer after the unauthorized transfer failure can be achieved, thereby reducing the transmission delay.
  • the terminal device continuously uses the first transmission resource multiple times, including:
  • the terminal device If the terminal device does not receive an acknowledgement (ACK) sent by the network device within a predetermined time after transmitting the second data, or when the terminal device is transmitting the second In the case that a negative acknowledgement (NACK) sent by the network device is received within a predetermined time after the data, the terminal device retransmits the second data on the first transmission resource.
  • ACK acknowledgement
  • NACK negative acknowledgement
  • the terminal device continuously uses the first transmission resource multiple times, including:
  • the terminal device If the second data is part of the first data, if the terminal device receives the acknowledgement ACK sent by the network device within a predetermined time after sending the second data, The terminal device sends third data to the network device on the first transmission resource, where the third data is part or all of the data in the first data except the second data.
  • the method further includes:
  • the terminal device sends the first indication information when the second data is sent, where the first indication information is used to indicate whether the terminal device has the second data after transmitting the second data. Other data needs to be transmitted using the first transmission resource.
  • the second data and the first indication information may be carried by the first data frame, and the second data frame and the first indication information are sent by the terminal device to send the first data frame.
  • the terminal device indicates, by using the first indication information, to the network device, whether the terminal device has other data than the second data, and needs to use the first transmission resource to be transmitted, so that the terminal device does not have the second data.
  • the network device can release the authorized resources in time to avoid waste of resources.
  • the first indication information is a DMRS sequence sent on a Demodulation Reference Signal (DMRS) resource in the first transmission resource;
  • DMRS Demodulation Reference Signal
  • the terminal device is instructed to use the first transmission resource to transmit data other than the second data after the second data is transmitted.
  • the first indication information is a second DMRS sequence, indicating that the terminal device needs to use the first transmission resource to transmit other data after the second data is transmitted after the second data is transmitted.
  • the method further includes:
  • the terminal device sends the second indication information when the second data is sent, where the second indication information is used to indicate whether the terminal device needs other transmission resources different from the first transmission resource.
  • the second data and the second indication information may be carried by the second data frame, and the second data frame is sent by the terminal device, and the second data and the second indication information are sent.
  • first data frame and the second data frame may also be the same data frame, and the data frame may carry the second data, the first indication information, and the second indication information.
  • the other transmission resource may be a transmission resource whose size is larger than the first transmission resource, but the first transmission resource is released while the other transmission resource is in effect.
  • the other transmission resource may be a transmission resource of an unlimited size, and the terminal device may use the other transmission resource and the first transmission resource at the same time. If the terminal device indicates that it needs other transmission resources different from the first transmission resource by using the second indication information, it indicates that the terminal device needs more transmission resources.
  • the terminal device indicates to the network device whether the terminal device further needs more transmission resources by using the second indication information, so that when the blind-grant resource is far smaller than the resource required for the terminal device to transmit data, The terminal device can acquire a larger resource while transmitting part of the data, thereby reducing the signaling interaction for requesting the transmission resource and reducing the transmission delay.
  • the terminal device sends a second to the network device on the first transmission resource.
  • the method further includes:
  • the terminal device sends fourth data to the network device by using the second transmission resource according to the second authorization message, where the fourth data includes part or all of the first data.
  • the terminal device indicates, by using the second indication information, the network device, whether the terminal device further needs other transmission resources different from the first transmission resource, so that the blind authorization resource is much smaller than the resource required for the terminal device to transmit data.
  • the terminal device can acquire a larger resource while transmitting part of the data, the signaling interaction for requesting the transmission resource can be reduced, and the transmission delay can be reduced.
  • the second indication information is a DMRS sequence sent on a DMRS resource in the first transmission resource
  • the second indication information is a third DMRS sequence, indicating that the terminal device does not need other transmission resources different from the first transmission resource;
  • the second indication information is a fourth DMRS sequence, indicating that the terminal device needs other transmission resources different from the first transmission resource.
  • a Cyclic Redundancy Check (CRC) in the first authorization message is scrambled by using a first identifier
  • the terminal device receives the first authorization message sent by the network device, including:
  • the terminal device uses the first identifier to descramble the CRC of the at least one downlink message sent by the network device, to receive the first authorization message, where the downlink message scrambled by using the first identifier is
  • the network device authorizes the terminal device to transmit a message of the resource after detecting that the terminal device fails to authorize the transmission of the first data.
  • the first authorization message further includes third indication information, where the third indication information is used to indicate that the first authorization message is that the network device detects that the terminal device is exempted A message authorizing transmission of a resource to the terminal device after the failure to authorize transmission of the first data.
  • the method before the receiving, by the terminal device, the first authorization message sent by the network device, the method further includes:
  • the terminal device receives a transmission configuration message sent by the network device, where the transmission configuration message includes the first identifier.
  • the transmission configuration message may be a radio resource control (RRC) message, a media access control control element (MAC CE), or the like, which is not limited in this embodiment of the present application.
  • RRC radio resource control
  • MAC CE media access control control element
  • the second aspect provides a transmission method, including: the network device sends a first authorization message to the terminal device, where the first authorization message is after the network device fails to detect that the terminal device is authorized to transmit the first data. And a message for transmitting the resource to the terminal device, where the first authorization message includes resource indication information, where the resource indication information is used to indicate the first transmission resource, where the first transmission resource is used for the terminal device to be consecutive Used to transmit the first data;
  • the network device detects second data sent by the terminal device on the first transmission resource, where the second data is part or all of the first data.
  • the first transmission resource is used by the terminal device to use the first data multiple times. It can be understood that the first transmission resource is a periodic resource, and if the size of the first transmission resource can be transmitted first. All of the data is transmitted on the first transmission resource, and if the size of the first transmission resource can only transmit a part of the first data, a part of the first data is transmitted on the first transmission resource, and then The remaining portion of the first data is continued to be transmitted using the first transmission resource in the next transmission cycle. Alternatively, if all or a part of the first data fails to be transmitted, the terminal device may continue to retransmit all or part of the first data using the first transmission resource in the next transmission period.
  • the first transmission resource may also be used to transmit other data different from the first data, which is not limited by the embodiment of the present application.
  • the network device can immediately authorize the transmission resource to the terminal device by using the first authorization message, so that the terminal device can use the transmission resource to transmit the data of the unauthorized transmission failure.
  • the purpose of fast transfer authorization transfer after the unauthorized transfer failure can be achieved, thereby reducing the transmission delay.
  • the method further includes:
  • the network device If the network device does not correctly receive the second data sent by the terminal device, the network device sends a negative acknowledgement NACK to the terminal device;
  • the second data is part of the first data
  • the method further includes:
  • the network device sends an acknowledgement ACK to the terminal device;
  • the network device detects third data sent by the terminal device on the first transmission resource, where the third data is part or all of data in the first data other than the second data. .
  • the method further includes:
  • the network device detects first indication information sent by the terminal device when detecting the second data
  • the second data and the first indication information may be carried by the first data frame.
  • the network device detects the first indication information sent by the terminal device when detecting the second data, where the network device detects the first The first indication information carried by the data frame.
  • the application does not limit whether the second data and the first indication information are carried by the same data frame.
  • the terminal device indicates, by using the first indication information, to the network device, whether the terminal device has other data than the second data, and needs to use the first transmission resource to be transmitted, so that the terminal device does not have the second data.
  • the network device can release the authorized resources in time to avoid waste of resources.
  • the first indication information is a DMRS sequence sent on a DMRS resource in the first transmission resource
  • the network device determines, according to the first indication information, whether the terminal device needs to use the first transmission resource to transmit other data other than the second data after the second data is transmitted. include:
  • the network device determines that the terminal device does not have other data other than the second data after transmitting the first data. Transmitting using the first transmission resource;
  • the network device determines that the terminal device has other data than the second data after transmitting the first data.
  • the first transmission resource transmission needs to be used.
  • the method further includes:
  • the network device detects second indication information sent by the terminal device when detecting the second data
  • the second data and the second indication information may be carried by the second data frame, where the network device detects the second indication information sent by the terminal device when detecting the second data, where the network device detects the second The second indication information carried by the data frame.
  • the application does not limit whether the second data and the second indication information are carried by the same data frame.
  • the method further includes:
  • the network device sends a second authorization message to the terminal device, where the second authorization message is used to indicate the second transmission resource;
  • the network device detects fourth data sent by the terminal device on the second transmission resource.
  • the terminal device indicates, by using the second indication information, the network device, whether the terminal device further needs other transmission resources different from the first transmission resource, so that the blind authorization resource is much smaller than the resource required for the terminal device to transmit data.
  • the terminal device can acquire a larger resource while transmitting part of the data, the signaling interaction for requesting the transmission resource can be reduced, and the transmission delay can be reduced.
  • the second indication information is a DMRS sequence sent on a DMRS resource in the first transmission resource
  • the network device determines, according to the second indication information, whether the terminal device needs other transmission resources different from the first transmission resource, including:
  • the network device determines that the terminal device does not need other transmission resources different from the first transmission resource
  • the network device determines that the terminal device needs another transmission resource different from the first transmission resource.
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the first authorization message further includes third indication information, where the third indication information is used to indicate that the first authorization message is that the network device detects that the terminal device is exempted A message authorizing transmission of a resource to the terminal device after the failure to authorize transmission of the first data.
  • the method before the network device sends the first authorization message to the terminal device, the method further includes:
  • the network device sends a transmission configuration message to the terminal device, where the transmission configuration message includes the first identifier.
  • a third aspect provides a transmission method, including: receiving, by a terminal device, a first authorization message sent by a network device, where the first authorization message is that the network device fails to detect that the terminal device is authorized to transmit the first data
  • the terminal device authorizes a message for transmitting a resource, where the first authorization message includes first resource indication information, the first resource indication information indicates a first transmission resource, and the first transmission resource is used at least for the terminal device to transmit a resource request message;
  • the terminal device receives a second authorization message sent by the network device, where the second authorization message includes second resource indication information, the second resource indication information indicates a second transmission resource, and the second transmission resource is used for Transmitting, by the terminal device, the second data;
  • the network device authorizes the resource for transmitting the resource request message to the terminal device by using the first authorization message, and the terminal device sends the resource request message to the network device according to the first authorization message.
  • the network device can allocate sufficient resources for the terminal device in the second authorization message according to the resource request message, so that the terminal device can transmit all the data that needs to be transmitted at one time, and realize the fast transfer authorization transmission after the unauthorized transfer failure occurs. the goal of.
  • the method in the embodiment of the present application can reduce the transmission delay.
  • the terminal device although the terminal device also sends the resource request message, because the terminal device does not send the resource request message, the terminal device can obtain the resource for transmitting the resource request message, so the letter can be reduced. Reduce overhead and reduce transmission delays.
  • the size of the first transmission resource is greater than a size of a resource required to transmit the resource request message, and the second data is a part of the first data;
  • the first authorization message further includes third resource indication information, where the third resource indication information is used to indicate a third transmission resource, where the third transmission resource is used by the terminal device Transmitting part or all of the first data;
  • the method further includes: before the terminal device receives the second authorization message sent by the network device, the method further includes:
  • the terminal device sends third data on the third transmission resource, where the third data is all data except the second data in the first data.
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the receiving, by the terminal device, the first authorization message sent by the network device includes:
  • the terminal device uses the first identifier to descramble the at least one downlink message sent by the network device, to receive the first authorization message, where the downlink message scrambled by using the first identifier is the
  • the network device authorizes the terminal device to transmit a message of the resource after detecting that the terminal device is unauthorised to transmit the first data.
  • the method before the receiving, by the terminal device, the first authorization message sent by the network device, the method further includes:
  • the terminal device receives a transmission configuration message sent by the network device, where the transmission configuration message includes the first identifier.
  • the transmission configuration message may be an RRC message, a MAC CE, or the like, which is not limited in this embodiment of the present application.
  • the fourth aspect provides a transmission method, including: the network device sends a first authorization message to the terminal device, where the first authorization message is that the network device fails to detect that the terminal device is authorized to transmit the first data.
  • the message that the terminal device authorizes the transmission of the resource, the first authorization message includes the first resource indication information, the first resource indication information indicates the first transmission resource, and the first transmission resource is used by the terminal device to transmit at least one Resource request message
  • the network device sends a second authorization message to the terminal device, where the second authorization message includes second resource indication information, the second resource indication information indicates a second transmission resource, and the second transmission resource is used by the Transmitting, by the terminal device, the second data;
  • the network device receives the second data that is sent by the terminal device on the second transmission resource.
  • the network device authorizes the resource for transmitting the resource request message to the terminal device by using the first authorization message, and the terminal device sends the resource request message to the network device according to the first authorization message.
  • the network device can allocate sufficient resources for the terminal device in the second authorization message according to the resource request message, so that the terminal device can transmit all the data that needs to be transmitted at one time, and realize the fast authorization transmission after the unauthorized transmission fails. purpose.
  • the method in the embodiment of the present application can reduce the transmission delay.
  • the terminal device although the terminal device also sends the resource request message, because the terminal device does not send the resource request message, the terminal device can obtain the resource for transmitting the resource request message, so the letter can be reduced. Reduce overhead and reduce transmission delays.
  • the size of the first transmission resource is greater than a size of a resource required to transmit the resource request message, and the second data is a part of the first data;
  • the network device receives the resource request message sent by the terminal device on the first transmission resource, and includes:
  • the first authorization message further includes third resource indication information, where the third resource indication information is used to indicate a third transmission resource, where the third transmission resource is used by the terminal device Transmitting part or all of the first data;
  • the method further includes: before the sending, by the network device, the second authorization message to the terminal device, the method further includes:
  • the network device receives third data that is sent by the terminal device on the third transmission resource, where the third data is all data except the second data in the first data.
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the method before the sending, by the network device, the first authorization message to the terminal device, the method further includes:
  • the network device sends a transmission configuration message to the terminal device, where the transmission configuration message includes the first identifier.
  • a terminal device for performing the method in any of the foregoing first aspect or any possible implementation manner of the first aspect, or to perform any of the foregoing third aspect or any possible implementation manner of the third aspect The method in .
  • the present application provides a network device, configured to perform the method in any of the foregoing second aspect or any possible implementation of the second aspect, or to perform any of the foregoing fourth or fourth aspects. The method in the implementation.
  • the present application provides a terminal device, including: a memory, a processor, and a transceiver, the memory storing a computer program executable on the processor, the processor executing when executing the computer program
  • a terminal device including: a memory, a processor, and a transceiver, the memory storing a computer program executable on the processor, the processor executing when executing the computer program
  • the present application provides a network device, including: a memory, a processor, and a transceiver, the memory storing a computer program executable on the processor, the processor executing when executing the computer program.
  • the present application provides a computer readable medium for storing a computer program comprising instructions for performing the methods of the above aspects or any of the possible implementations of the above aspects.
  • the present application provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the methods of the above aspects or any of the possible implementations of the various aspects described above.
  • the present application provides a chip, including: an input interface, an output interface, at least one processor, and a memory, wherein the input interface, the output interface, the processor, and the memory pass through an internal connection path.
  • the processor Communicating with each other, the processor is operative to execute code in the memory, and when the code is executed, the processor is operative to perform the methods of the above aspects or any of the possible implementations of the various aspects described above.
  • FIG. 1 is a schematic structural diagram of a system provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an access process of an RA mechanism
  • FIG. 3 is a schematic diagram of an access process of an SR mechanism
  • FIG. 4 is a schematic diagram of an access procedure of an SPS mechanism
  • FIG. 5 is a schematic flowchart of a transmission method according to an embodiment of the present application.
  • FIG. 6 is a schematic flowchart of a transmission method according to an embodiment of the present application.
  • FIG. 7 is a schematic flowchart of a transmission method according to another embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a transmission method according to an embodiment of the present application.
  • FIG. 9 is a schematic block diagram of a terminal device according to an embodiment of the present application.
  • FIG. 10 is a schematic block diagram of a network device according to an embodiment of the present application.
  • FIG. 11 is a schematic block diagram of a terminal device according to another embodiment of the present disclosure.
  • FIG. 12 is a schematic block diagram of a network device according to another embodiment of the present disclosure.
  • FIG. 13 is a schematic block diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 14 is a schematic block diagram of another network device according to an embodiment of the present application.
  • the size of the sequence number of each process does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiment of the present application.
  • the implementation process constitutes any limitation.
  • the size of the sequence number of each process does not mean the order of execution, and the order of execution of each process should be determined by its function and internal logic, and should not be taken to the embodiment of the present application.
  • the implementation process constitutes any limitation.
  • GSM Global System of Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • GPRS General Packet Radio Service
  • LTE Long Term Evolution
  • FDD Frequency Division Duplex
  • TDD Time Division Duplex
  • UMTS Universal Mobile Telecommunication System
  • WiMAX Worldwide Interoperability for Microwave Access
  • 5G 5th Generation
  • NR New Radio
  • the terminal device in the embodiment of the present application may refer to a user equipment (User Equipment, UE), an access terminal, a subscriber unit, a subscriber station, a mobile station, a mobile station, a remote station, a remote terminal, a mobile device, a user terminal, a terminal, and a wireless device.
  • Communication device user agent or user device.
  • the terminal device may also be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA), with wireless communication.
  • SIP Session Initiation Protocol
  • WLL Wireless Local Loop
  • PDA Personal Digital Assistant
  • the network device in the embodiment of the present application may be a device for communicating with the terminal device, and the network device may be a Global System of Mobile communication (GSM) system or Code Division Multiple Access (CDMA).
  • Base Transceiver Station which may also be a base station (NodeB, NB) in a Wideband Code Division Multiple Access (WCDMA) system, or an evolved base station in an LTE system (Evolutional The NodeB, the eNB or the eNodeB) may also be a wireless controller in a Cloud Radio Access Network (CRAN) scenario, or the network device may be a relay station, an access point, an in-vehicle device, a wearable device, and a 5G.
  • the network device in the network or the network device in the PLMN network in the future is not limited in this embodiment.
  • FIG. 1 is a schematic diagram of a system 100 suitable for use with embodiments of the present application.
  • the system 100 includes a network device 101, which also includes a terminal device 102 and a terminal device 103 that are located within the coverage of the network device 101.
  • the network device 101 can communicate with the terminal device 102 and the terminal device 103. It should be understood that only two terminal devices within the coverage of the network device 101 are shown in Fig. 1 as an example. Obviously, there may be more terminal devices within the coverage of the network device 101.
  • the transmission of the terminal device 102 or the terminal device 103 to the network device 101 is referred to as uplink transmission.
  • the uplink transmission mechanism defined in the existing LTE specifications includes a Random Access (RA) mechanism, a Scheduling Request (SR) mechanism, and a Semi-Persistent Scheduling (SPS) mechanism.
  • RA Random Access
  • SR Scheduling Request
  • SPS Semi-Persistent Scheduling
  • FIG. 2 shows a schematic diagram of the access procedure of the RA mechanism.
  • the access process of the RA mechanism is introduced below with reference to FIG. 2 .
  • "transmission” and “transmission” as verbs can be replaced with each other.
  • the terminal device sends an RA request message to the network device.
  • the RA request message is sent in the public random access resource.
  • the RA request message is a very simple signal that contains only a random preamble sequence indicating that there is a terminal device to send data, and no information indicates which terminal device is to send data.
  • the network device sends an uplink grant message #1 to the terminal device.
  • the network device After detecting the preamble sequence, that is, the RA request message, the network device sends an uplink grant message #1 to the terminal device.
  • the uplink grant message #1 only authorizes a small one-time use transmission resource for the terminal device to transmit a Buffer Status Report (BSR) message.
  • BSR Buffer Status Report
  • the terminal device sends a BSR message to the network device.
  • the terminal device After receiving the uplink grant message #1, the terminal device sends a BSR message in the initial uplink data transmission resource authorized by the uplink grant message #1, and indicates the amount of data to be sent in the BSR message.
  • the network device sends an uplink grant message #2 to the terminal device.
  • the multiple terminal devices may consider that the transmission resource of the initial uplink grant in S204 is for itself, which may result in more in S206.
  • a terminal device transmits a BSR message on the same transmission resource, a collision occurs, and the network device cannot receive the buffer status report, and the network device does not execute S208 for further authorization.
  • the network device determines, according to the amount of data to be sent by the terminal device and the transmission rate that the terminal device can use, the data transmission resource that should be allocated to the terminal device, and sends an uplink grant message #2 in S208.
  • the allocated data transmission resource is sent to the terminal device.
  • the uplink grant message #2 is scrambled by using a Cell Radio Network Temporary Identifier (C-RNTI) of the terminal device.
  • C-RNTI Cell Radio Network Temporary Identifier
  • the terminal device sends data to the network device.
  • the terminal device After receiving the uplink grant message #2 by using the C-RNTI, the terminal device sends data on the authorized data transmission resource.
  • the network device sends an ACK to the terminal device.
  • the allocated data transmission resource is released (or recycled) after returning the ACK signal indicating the correct reception.
  • the network device If the network device does not correctly receive the data sent by the terminal device, after transmitting a NACK signal indicating that the terminal device does not correctly receive, it attempts to receive data that the terminal device retransmits on the allocated data transmission resource. The specific process of transmitting and receiving data is not described in detail here.
  • FIG. 3 shows a schematic diagram of an access procedure of the SR mechanism.
  • the access process of the SR mechanism is introduced below with reference to FIG. 3.
  • the terminal device sends an SR message to the network device.
  • the SR message is sent to the network device on the dedicated resource, that is, the SR resource.
  • the network device sends an uplink grant message #3 to the terminal device.
  • Upstream Authorization Message #3 authorizes only a small single-use transmission resource for the terminal device to transmit BSR messages.
  • the terminal device sends a BSR message to the network device.
  • the network device sends an uplink grant message #4 to the terminal device.
  • the network device determines the data transmission resource that should be allocated to the terminal device according to the amount of data to be sent by the terminal device and the transmission rate that the terminal device can use. In S308, the uplink authorization message #4 is sent, and the allocated data transmission resource is sent to the terminal device.
  • the terminal device sends data to the network device.
  • the network device sends an ACK to the terminal device.
  • the allocated data transmission resource is released after the ACK signal indicating the correct reception is returned.
  • the network device If the network device does not correctly receive the data sent by the terminal device, after transmitting a NACK signal indicating that the terminal device does not correctly receive, it attempts to receive data that the terminal device retransmits on the allocated data transmission resource. The specific process of transmitting and receiving data is not described in detail here.
  • the access process of the SR mechanism is very similar to the access process of the RA mechanism.
  • the difference is mainly that, in S202, the RA requests to use a common random access resource, and in S302, the SR message is used. It is a terminal device-specific resource, so there is no conflict in the SR access process.
  • the terminal device may obtain the transmission resource of the transmission data in S208, and obtain a dedicated resource for transmitting the SR message, that is, the SR resource, and the SR resource periodically appears. . If the terminal device has an SR resource, when the uplink transmission is required, the SR message is sent on the SR resource, and the SR access process is performed instead of the RA access process.
  • the SR message is also a very simple signal, but since the transmission resource is dedicated to the terminal device, the network device receives the SR message on the dedicated resource, and knows which terminal device has the transmission requirement, and the uplink authorization message #3 of S304 is authorized.
  • the resources used by the terminal device to transmit RSR messages are dedicated to the terminal device and do not conflict.
  • FIG. 4 shows a schematic diagram of the access procedure of the SPS mechanism.
  • the access process of the SPS mechanism is introduced below with reference to FIG. 4 .
  • the SPS mechanism is designed for voice services.
  • the feature of the voice service is that the terminal device periodically sends data and periodically receives data. If the resource is temporarily allocated for each transmission, the signaling overhead is too large and not timely. Therefore, the transmission resource needs to be configured and reused once.
  • the network device sends an SPS configuration message to the terminal device.
  • the establishment of the voice service triggers the network device to send an RRC layer configuration message, that is, an SPS configuration message, to the terminal device.
  • the RRC layer is a radio resource control layer between the terminal device and the network device, and is equivalent to the Layer 2 or MAC layer of the protocol stack.
  • the network device configures the SPS-RNTI, the transmission period, the implicit release null number Q, and the like to the terminal device through the SPS configuration message.
  • the SPS-RNTI is a semi-persistently scheduled RNTI for the terminal equipment.
  • a terminal device may have multiple RNTIs for different purposes.
  • the C-RNTI mentioned in the above description about the RA mechanism is an RNTI commonly used by terminal devices.
  • the transmission period is a period in which the terminal device transmits uplink data and receives downlink data, and the voice service usually transmits and receives one data every 10 milliseconds or 20 milliseconds.
  • the meaning of the implicit release null period Q is that if the network device does not receive the uplink data of the terminal device in consecutive Q cycles, the transmission resource allocated to the terminal device is released, that is, the network device considers that the voice session ends.
  • the value of C can be 6, 10, and the like.
  • the network device sends an SPS authorization message to the terminal device.
  • the network device uses SPS authorization messages to authorize SPS resources.
  • the SPS resource includes a transmission resource for transmitting the uplink data by the terminal device, a transmission resource for receiving the downlink data, and other information to indicate that the SPS is activated, and the like, which is not described in detail herein.
  • the content of the SPS authorization message does not include the identification information of the terminal device, but is scrambled by using the relevant RNTI of the terminal device.
  • the terminal device needs to descramble with its own various RNTIs to receive the SPS authorization message. If the terminal device successfully receives an uplink grant message using its own SPS-RNTI, the uplink grant message is an SPS grant message to the terminal device.
  • the uplink grant message of the RA and SR mechanisms is scrambled using the C-RNTI of the terminal device. Both C-RNTI and SPS-RNTI are temporary identifiers of terminal devices, but their uses are different.
  • the terminal device sends uplink data to the network device.
  • the terminal device After the terminal device receives the SPS authorization message and the information therein indicates that the SPS resource is activated, the terminal device can periodically communicate with the network device using the authorized resource. For example, when the uplink device needs to transmit, the terminal device may send the uplink data to the network device in the transmission resource that uses the terminal device to transmit the uplink data.
  • the network device sends an ACK to the terminal device.
  • the network device If the network device correctly receives the data sent by the terminal device, it sends back an ACK signal indicating that it is correctly received.
  • the network device sends downlink data to the terminal device.
  • the terminal device After the terminal device receives the SPS authorization message and the information therein indicates that the SPS resource is activated, the terminal device can periodically communicate with the network device using the authorized resource. For example, when the network device needs to transmit downlink data, the network device may send downlink data to the terminal device by using the transmission resource that receives the downlink data.
  • the terminal device sends an ACK to the network device.
  • the ACK signal indicating the correct reception is sent back.
  • the terminal device periodically generates new data, if the terminal device fails to transmit one data, the data that failed to be transmitted cannot be retransmitted on the SPS resource of the next cycle, but the network device separately allocates the temporary data.
  • the resource is used to retransmit data that failed to be transmitted.
  • the network device sends the deactivation indication information to the terminal device.
  • the network device may send a deactivation indication message to the terminal device, indicating that the SPS resource is deactivated, so as to release the SPS resource.
  • the network device may also release the SPS resource after receiving the uplink data of the terminal device in consecutive Q cycles.
  • the 5G wireless communication standard proposes to use the Grant free transmission technology. That is, the network device pre-arranges a shared CTA, and the CTA appears in each unauthorized transmission period, and the terminal device randomly selects one or more CTU transmissions in the CTA of the latest unlicensed transmission period when there is data transmission. data. Since the terminal device does not request the network device to allocate resources before transmitting the data, this transmission technology is called an unlicensed transmission.
  • the terminal device 102 can transmit data to the network device 101 by using an unlicensed transmission technology. That is, the terminal device 102 randomly selects one or more CTU transmission data in the CTA of the most recent unauthorized transmission period when there is data transmission. If the terminal device 102 fails the authorization transmission, for example, the terminal device fails to transmit the data K times consecutively, or the terminal device 102 has not transmitted K times but each transmission fails and the network device 101 does not want to wait for subsequent unauthorized transmission. The network device must authorize the transmission resource to the terminal device to reliably retransmit the data to be transmitted. This process is called unlicensed transmission to authorized transmission GF2GB.
  • the terminal device can randomly select the resource transmission, and the network device cannot identify the terminal device from which the transmission is transmitted through the resource location.
  • the current solution is to identify the terminal device through the DMRS sequence. Specifically, when the terminal device transmits, in order to enable the network device to correctly demodulate, the DMRS sequence is transmitted on some fixed locations (ie, DMRS transmission resources) of the transmission resource unit. The network device demodulates the signals at other locations based on the DMRS at these fixed locations. If different terminal devices transmit different DMRS sequences, the network device can identify which terminal device the data is sent through the DMRS sequence.
  • the network device can know which terminal devices are transmitting data, and can correctly initiate the GF2GB to the terminal device when the data of the unauthorized transmission cannot be correctly received.
  • the current technology does not involve a scheme of how to perform an authorized transmission quickly after an unlicensed transmission failure.
  • the present application provides a transmission method. After the network device fails to authorize transmission, the network device authorizes the transmission resource to the terminal device, so that the terminal device can transmit data through the authorized transmission resource.
  • FIG. 5 is a schematic interaction diagram of an example of a transmission method according to an embodiment of the present application. It should be understood that FIG. 5 illustrates the detailed steps or operations of method 500, but these steps or operations are merely examples, and other embodiments of the present application may perform other operations or only some of the operations of FIG.
  • the method 500 can be performed by a network device and a terminal device.
  • the network device may be the network device 101 in the system 100, and the terminal device may be the terminal device 102 or the terminal device 103 in the system 100.
  • the network device sends a blind authorization message #1 to the terminal device (that is, an example of the first authorization message).
  • the network device may authorize the transmission resource for transmitting the uplink data to the terminal device.
  • the network device can learn that the terminal device is performing the unlicensed transmission by detecting the DMRS sequence on the CTU, but the network device considers that the terminal device is authorized to transmit without authorization when the data transmitted by the terminal device is not successfully received.
  • the GF2GB process is started to authorize transmission resources to the terminal device.
  • the message sent by the terminal device when the terminal device authorizes the transmission resource is recorded as a blind authorization message.
  • the transmission resources authorized by the blind authorization message are recorded as: blind authorization resources.
  • the blind authorization message is different from the uplink authorization message in the prior art, for example, the uplink grant message #2 in the RA mechanism access technology, the uplink grant message #4 in the SR mechanism access process, and the SPS mechanism access technology. SPS authorization message.
  • the blind authorization message is triggered after the terminal device fails to transmit the authorization.
  • the authorization message in the RA mechanism and the SR mechanism access technology is sent after the terminal device sends the scheduling request or the cache report.
  • the SPS mechanism accesses the authorized resources in the technology. It is sent by the network device after the terminal device and the network device establish a voice service, and has no relationship with the unauthorized transmission.
  • the blind authorization resource is also different from the resources (ie, authorized resources) authorized by the uplink authorization message in the prior art.
  • the size of the authorized resource is determined by the network device according to the requirement reported by the terminal device, for example, the size of the data to be transmitted. Generally, the size of the authorized resource is equal to or slightly larger than the size of the data that the terminal device needs to transmit.
  • the size of the resource authorized by the blind authorization message (ie, the blind authorization resource) is determined by the network device without knowing the size of the data that the terminal device needs to transmit.
  • the network device may determine the size of the blind authorization resource according to a preset value, a value negotiated in advance with the terminal device, or a number of CTUs occupied by the terminal device detected in the CTA.
  • the embodiment of the present application does not specifically limit how the network device determines the size of the blind authorization resource. It is easy to understand that blind authorization resources are not in any CTA.
  • the blind authorization resource can be used for multiple consecutive uses of the terminal device to transmit the first data of the previous unauthorized transfer failure. Specifically, if the size of the blind authorization resource can transmit all of the first data, all the first data is transmitted on the blind authorization resource, and if the size of the blind authorization resource can only transmit a part of the first data, then A portion of the first data is transmitted on the blind grant resource, and then the remaining portion of the first data is transmitted using the blind grant resource in the next transmission cycle. Alternatively, if all or a part of the first data fails to be transmitted, the terminal device may continue to use the blind authorization resource to retransmit all or part of the first data in the next transmission period.
  • the authorized resources in the RA mechanism and the SR mechanism access technology are only used to transmit the specified data. After the data is successfully transmitted, the authorized resources are released and cannot be used to transmit new data. Equivalent to if the terminal device transmits a part of the first data on the authorized resource, the authorized resource is released after the partial data is successfully transmitted, and cannot be used to transmit the remaining part of the first data. Moreover, if the authorized resource is an authorized resource in the access technology of the SPS mechanism, if the terminal device fails to transmit a data, the terminal device cannot use the authorized resource to retransmit the data that fails to be transmitted, but only uses the authorized resource to transmit the terminal device cycle. Sexually generated new data. Equivalent to if the terminal device transmits all or part of the first data on the authorized resource, and all or a part of the first data fails to be transmitted, the terminal device cannot use the authorized resource to retransmit the data that fails to be transmitted.
  • the blind authorization resource can also transmit other data than the first data.
  • the newly generated data of the terminal device or the data other than the first data buffered by the terminal device may be transmitted.
  • the network device determines that the terminal device may send the blind authorization message #1 to the terminal device after the unauthorized transmission fails, and the blind authorization message #1 may include the transmission resource #1 (ie, an example of the blind authorization resource).
  • the information that is, the resource indication information #A (that is, an example of the resource indication information).
  • the terminal device can determine the transmission resource #1 by the resource indication information #A in the blind authorization message #1.
  • the terminal device may transmit the second data on the transmission resource #1, and the second data is part or all of the first data.
  • a blind authorization resource can be understood as a periodic piece of resources.
  • the period of the blind authorization resource is recorded as: P, then P represents the length of time that the blind authorization resource is cyclically generated, that is, the blind authorized resource appears once every P.
  • P may be one subframe or time slot in the system, or may be multiple subframes or time slots, or multiple Orthogonal Frequency Division Multiplexing (OFDM) symbols, which is not limited in this embodiment.
  • the blind grant resource may be a time-frequency resource block in the P. Specifically, it may occupy all OFDM symbols and partial sub-carriers in the P, or may occupy part of the OFDM symbols and all carriers in the P, or occupy part of the OFDM symbols in the P. Partial subcarriers. Specifically, how to indicate a blind authorization resource is not specifically limited in this application. P can be the same or different from the unauthorized transfer period.
  • the cyclic redundancy check code CRC in the blind authorization message may be scrambled by using the first identifier.
  • the first flag is referred to as B-RNTI #1.
  • B-RNTI (Blind-grant Radio Network Tempory Identity) can be called a blind authorized wireless network temporary identifier.
  • the downlink message is a blind authorization message.
  • the network device may use the CRC in the B-RNTI #1 scrambled blind authorization message #1, and if the terminal device uses the B-RNTI #1 to descramble the blind authorization message #1, the blind authorization message may be determined. 1 is a blind authorization message.
  • the terminal device may attempt to use the B-RNTI #1 to descramble the CRC in the downlink message in each subsequent transmission period, such as an unlicensed transmission period. If the descrambling is successfully performed by using the B-RNTI #1, the terminal device may determine that the downlink message is a blind authorization message.
  • the blind authorization message may include the indication information #1 (ie, an example of the third indication information).
  • the indication information #1 is used to indicate that the blind authorization message is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device is not authorized to transmit data. That is, if a downlink message includes the indication information #1, the downlink message is a blind authorization message, or the downlink message is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device is not authorized to transmit data. .
  • the blind authorization message #1 may include the indication information #1. If the terminal device detects that the blind authorization message #1 includes the indication information #1, it may determine that the blind authorization message #1 is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device is not authorized to transmit the first data, and The transmission resource #1 can be determined based on the resource indication information #A in the blind authorization message #1.
  • the blind authorization message may be downlink control information of a certain format (meaning that the information itself is downlink transmission).
  • the downlink control information includes a type field to indicate what kind of information is included in the downlink control information, for example, the type field takes a first value, and the downlink control information includes blind authorization information.
  • the type field takes other values, it indicates that the downlink control information contains some other information.
  • the first value herein may be, for example, 0 or 1, and the like.
  • the terminal device when receiving the blind grant message, uses the same RNTI as the RNTI used by some other downlink control information, such as C-RNTI.
  • C-RNTI some other downlink control information
  • the method may further include:
  • the network device sends a transmission configuration message #1 to the terminal device (that is, an example of a transmission configuration message).
  • the transmission configuration message #1 may include a first identifier, that is, B-RNTI #1.
  • the terminal device may attempt to use the B-RNTI #1 to descramble the CRC in the downlink message in each subsequent transmission period, such as an unlicensed transmission period. After the descrambling is successfully performed by the B-RNTI #1, the terminal device can determine that the downlink message is a blind authorization message, and thus obtain a blind authorization resource.
  • the transmission configuration message #1 may be an RRC message, a MAC CE, or the like, which is not limited in this embodiment of the present application.
  • the transmission configuration message #1 may include transmission period indication information and/or release duration indication information.
  • the transmission period indication information is used to indicate the above-described transmission period P.
  • the transmission period P For details of the transmission period P, refer to the description above. For brevity, details are not described herein again.
  • the P may be pre-defined or specified by the system.
  • the embodiment of the present application does not limit the configuration and size of the transmission period P.
  • the release duration indication information is used to indicate the number of cycles C.
  • the number of cycles C indicates that the network device can release the blind authorization resource if the consecutive C transmission periods, that is, the continuous C intra-P network devices do not receive the data sent by the terminal device on the blind authorization resource (for example, the transmission resource #1). .
  • C may also be predefined or system defined. For example, considering the low latency feature of the URLLC, if the terminal device should transmit the subsequent data immediately, C can take a relatively small fixed value, for example 2. The embodiment of the present application does not limit the size and configuration of C.
  • the terminal device transmits data #1 (that is, an example of the second data) to the network device on the transmission resource #1. Accordingly, the network device detects the data #1 transmitted by the terminal device on the transmission resource #1.
  • the unauthorized transmission may be stopped, and the data previously transmitted without authorization, that is, the first data, is transmitted using the transmission resource #1. If the transmission resource #1 is insufficient to transmit the amount of data for unauthorized transmission before transmitting the terminal device, the terminal device may transmit the partial data by using the transmission resource #1, and then transmit the remaining data again using the transmission resource #1 after the success. If the transmission resource #1 is large enough, the terminal device can use the transmission resource #1 to transmit more data including the data of the previously unauthorized transmission.
  • the terminal device transmits data #1 on the transmission resource #1 as an example for description. Among them, the data #1 may be part or all of the first data.
  • the network device After S504, the network device correctly receives data #1.
  • the method may further include:
  • the network device sends an ACK to the terminal device.
  • the terminal device may stop the data transmission after receiving the ACK sent by the network device. process.
  • the network device does not correctly receive data #1.
  • the network device does not send an ACK to the terminal device, or the network device sends a NACK to the terminal device.
  • the terminal device does not receive the ACK within a predetermined time after transmitting the data #1, or the terminal device receives the NACK within a predetermined time after transmitting the data #1.
  • the method may further include:
  • the terminal device retransmits the data #1 on the transmission resource #1.
  • the terminal device retransmits the data #1 on the transmission resource #1 of the next transmission cycle.
  • the terminal device may execute S508.
  • the terminal device sends data #2 to the network device on the transmission resource #1. Accordingly, the network device detects data #2 on transmission resource #1.
  • the data #2 is a part or all of the data other than the data #1 in the first data.
  • the terminal device may transmit all of the data other than the data #1 in the first data in S508. If the transmission resource #1 is insufficient to transmit all of the data other than the data #1 in the first data, the terminal device may transmit a part of the data other than the data #1 in the first data in S508.
  • the network device does not correctly receive data #1 means that the network device detects the signal on the transmission resource #1 but cannot successfully parse, that is, the network device determines that the terminal device is transmitting data but The network device sends a NACK to the terminal device due to interference and cannot receive correctly.
  • the network device does not detect a signal on the transmission resource #1, and the network device considers that the terminal device is not transmitting, and the network device does not need to send a NACK to the terminal device.
  • the absence of a signal detected means that the received power detected by the network device in the transmission resource #1 is lower than a threshold pw, and the detected signal refers to the reception detected by the network device in the transmission resource #1. The power is above the threshold pw.
  • the network device can immediately authorize the transmission resource to the terminal device by using the first authorization message, so that the terminal device can use the transmission resource to transmit the data of the unauthorized transmission failure.
  • the purpose of fast transfer authorization transfer after the unauthorized transfer failure can be achieved, thereby reducing the transmission delay.
  • the method may further include:
  • the terminal device transmits the indication information #2 (that is, an example of the first indication information) and/or the indication information #3 (that is, an example of the second indication information) to the network device.
  • the indication information #2 is used to indicate whether the terminal device needs to use the transmission resource #1 to transmit other data after the transmission of the data #1.
  • the indication information #3 is used to indicate whether the terminal device needs other transmission resources different from the transmission resource #1.
  • the other transmission resource may be a piece of transmission resource whose size is larger than the transmission resource #1, but the transmission resource #1 is released while the other transmission resource is in effect.
  • the other transmission resource may be a transmission resource of an unlimited size, and the terminal device may use the other transmission resource and the transmission resource #1 at the same time.
  • the terminal device may also send the indication information #2 and/or the indication information #3 to the network device before transmitting the data #1, or before transmitting the data #1, or after transmitting the data #1.
  • the indication information #2 it is indicated to the network device by the indication information #2 whether the terminal device needs to transmit using the transmission resource #1 after the transmission of the data #1.
  • the indication information #3 indicates to the network device whether the terminal device requires other transmission resources different from the transmission resource #1.
  • the simultaneous transmission of the data #1 and the indication information #2 may be that the data #1 and the indication information #2 are transmitted in the same data frame (for example, the first data frame), similarly, the data #1 and the indication information #
  • the simultaneous transmission may be that the data #1 and the indication information #3 are transmitted in the same data frame (for example, the second data frame), but the embodiment of the present application does not limit this.
  • data #1 and indication information #2 can also be carried by two different data frames transmitted at the same time.
  • the terminal device does not need to use the transmission resource #1 to transmit other data except the data #1 after the data #1 is transmitted. It can be understood that after the terminal device transmits the data #1, there is no other or more data needs. Transfer to a network device.
  • data #1 is all of the first data, and after the terminal device transmits the data #1, no other or more data needs to be transmitted to the network device. After the terminal device transmits the data #1, other data except the data #1 needs to be transmitted using the transmission resource #1. It can be understood that the terminal device has other or more data needs after the data #1 is transmitted. Transfer to a network device.
  • the data #1 is part of the first data, and the terminal device needs to transmit the remaining portion of the first data after transmitting the portion of the first data.
  • the terminal device does not need other transmission resources different from the transmission resource #1, and it can be understood that the terminal device does not need more transmission resources.
  • data #1 is all data that the terminal device needs to send to the network device, for example, data #1 is all of the first data.
  • the terminal device transmits the data several times, for example, once or twice, to transmit all the data that the terminal device needs to send to the network device.
  • the data #1 is part of the first data, and after the terminal device successfully transmits the data #1 and transmits it once or twice, the remaining portion of the first data can be transmitted. At this time, the terminal device does not need more transmission resources.
  • the terminal device needs other transmission resources different from the transmission resource #1, and it can be understood that the terminal device needs more transmission resources. For example, a terminal device cannot transmit all of its data that needs to be sent to a network device several times, such as once or twice. For example, the terminal device cannot transmit the first data once or twice, but needs more or larger transmission resources to transmit all the data that needs to be sent to the network device as soon as possible to reduce the transmission delay.
  • the indication information #2 may be a first DMRS sequence or a second DMRS sequence transmitted on the DMRS resource in the transmission resource #1. If the indication information #2 is the first DMRS sequence, the indication information #2 indicates that the terminal device does not transmit data other than the data #1 after the transmission of the data #1, and needs to be transmitted using the transmission resource #1. If the indication information #2 is the second DMRS sequence, the indication information #2 indicates that the terminal device needs to transmit using the transmission resource #1 after the transmission of the data #1 and other data other than the data #1.
  • the DMRS resource is a resource that transmits a DMRS sequence, and generally, the DMRS sequence is transmitted together with the data.
  • the first DMRS sequence is transmitted to the network device; After the terminal device transmits the data #1 and other data except the data #1 needs to be transmitted using the transmission resource #1, the second DMRS sequence is transmitted to the network device.
  • the network device can determine, according to whether the first DMRS sequence or the second DMRS sequence is received or detected, whether the terminal device needs to use the transmission resource #1 to transmit after the data #1 is transmitted.
  • the network device may determine that the terminal device does not need other data except the current data after transmitting the current data (ie, data #1). Transfer using transport resource #1. If the network device detects the second DMRS sequence while detecting data on the transmission resource #1, the network device may determine that the terminal device needs to use other data than the current data after transmitting the current data (ie, data #1). Transmission resource #1 transmission.
  • the network device may release the transmission resource after several transmission cycles after correctly receiving the data #1. #1. Since the transmission reliability of the ACK signal is very high, the possibility that the terminal device does not receive the ACK is extremely low, so the network device can immediately release the transmission resource if it is determined that the terminal device does not need to transmit other data except the data #1. 1, to improve the efficiency of resource utilization.
  • the network device reserves the transmission resource #1 until the terminal device transmits the first data, or transmits. Finish all data that needs to be sent to the network device.
  • the indication information #2 may also be one bit of information.
  • the indication information #2 is 0, indicating that the terminal device does not need to transmit data other than the data #1 after transmitting the data #1 to the network device.
  • the indication information #2 is 1, indicating that the terminal device needs to transmit to the network device other than the data #1 after the data #1 is transmitted.
  • the meaning of the bit values of 0 and 1 can also be defined as the opposite of the example, which is not limited in the embodiment of the present application.
  • the embodiment of the present application does not limit the bit occupied by the indication information #2.
  • the description only takes one bit of the indication information #2 as an example.
  • the terminal device indicates to the network device whether the terminal device has more data to transmit through the indication information #2, so that when the terminal device has no more data transmission, the network device can release the authorized in time. Resources to avoid wasting resources.
  • the indication information #3 may be a third DMRS sequence or a fourth DMRS sequence transmitted on the DMRS resource in the transmission resource #1. If the indication information #3 is the third DMRS sequence, the indication information #3 indicates that the terminal device does not need other transmission resources different from the transmission resource #1; if the indication information #3 is the fourth DMRS sequence, the indication information #3 indicates that the terminal device needs Different from other transmission resources of transmission resource #1.
  • the terminal device may send the third DMRS sequence to the network device while transmitting the data #1, if the terminal device needs to be different from the transmission resource #1
  • the other transmission resources send a fourth DMRS sequence to the network device.
  • the network device can determine, according to whether the third DMRS sequence or the fourth DMRS sequence is received, whether the terminal device needs other transmission resources different from the transmission resource #1.
  • the network device may send the blind authorization message #2 (ie, an example of the second authorization message) to the terminal device. Then, the terminal device transmits data #3 (ie, an example of the fourth data) to the network device using the transmission resource #2 according to the blind authorization message #2.
  • the blind authorization message #2 is used to indicate the transmission resource #2.
  • the terminal device can transmit data to the network device on the transmission resource #1 and the transmission resource #2, or the transmission resource #2 is larger in size than the transmission resource #1 and the terminal device can be on the transmission resource #2 and cannot be in the transmission resource #1Uploads data #3 to the network device.
  • Data #3 may be a larger piece of data after the successful transmission of data #1, for example, data #1 is a small portion of the first data, and data #3 may be a remaining portion of the first data.
  • the data #1 may be other data that the terminal device needs to send to the network device in addition to the first data.
  • data #3 contains data #1 when data #1 is not successfully transmitted.
  • data #1 may be transmitted on transmission resource #1, and data #3 may be transmitted on transmission resource #2 (here data #3 may include the first data except All except data #1).
  • the size of the transmission resource #2 may be greater than the transmission resource #1.
  • the size of the transmission resource #2 may be twice the size of the transmission resource #1, but the embodiment of the present application does not limit this.
  • the network device releases the transmission resource #1 while authorizing the transmission of the resource #2 to the terminal device. After receiving the blind authorization message #2, the terminal device can only send data #3 to the network device on the transmission resource #2.
  • the network device grants the transmission resource #2 of an unlimited size to the terminal device, and reserves the transmission resource #1, and the terminal device can simultaneously transmit the data #3 to the network device on the transmission resource #1 and the transmission resource #2.
  • the transmission resource #2 is supplemented by the transmission resource #1, that is, the network device grants the transmission resource #2 while retaining the transmission resource #1 as an example. If the network device does not detect a signal on the transmission resource #1 and the transmission resource #2 for consecutive C transmission periods, that is, the terminal device does not transmit data on the transmission resource #1 and the transmission resource #2 for consecutive C transmission periods, the network The device releases transmission resource #1 and transmission resource #2 to use transmission resource #1 and transmission resource #2 for other purposes. For example, after the terminal device successfully transmits the data #3, no more data needs to be sent, the transmission resource #1 and the transmission resource #2 are vacant, and the network device discovers that there is no data transmission on the transmission resource #1 for consecutive C transmission periods, and then releases Transfer resource #1 and transfer resource #2.
  • the network device can release the blind authorization resource to use the blind authorization resource for other purposes, thereby improving resource utilization and avoiding waste of resources.
  • the indication information #3 may be one bit of information.
  • the indication information #3 is 0, indicating that the terminal device does not need other transmission resources different from the transmission resource #1.
  • the indication information #3 is 1, indicating that the terminal device needs other transmission resources different from the transmission resource #1.
  • the meaning of the bit values of 0 and 1 can also be defined as the opposite of the example, which is not limited in the embodiment of the present application.
  • the embodiment of the present application does not limit the bit occupied by the indication information #3.
  • only the indication information #3 occupies one bit as an example for description.
  • the terminal device indicates to the network device whether the terminal device further needs more transmission resources by using the indication information #3, so that when the blind authorization resource is much smaller than the resource required for the terminal device to transmit data, the terminal The device can acquire more resources while transmitting part of the data, thereby reducing the signaling interaction for requesting the transmission resource and reducing the transmission delay.
  • the terminal device may send only one of the indication information #2 and the indication information #3, and may also send the two to the network device, which is not limited in this embodiment of the present application. If the terminal device sends both to the network device, the two can be sent at the same time or can be sent at different times. This application does not limit the order of sending between the two.
  • the first DMRS sequence, the second DMRS sequence, the third DMRS sequence, and/or the fourth DMRS sequence may pass the blind authorization message #1 or the system broadcast information or the transmission configuration in the foregoing.
  • the message #1 is carried, and the embodiment of the present application does not limit this.
  • the indication information #3 is equally available. If the indication information #2 is not a DMRS sequence, but other signals (eg, reference signals) or information, etc., the other signals (eg, reference signals) or information may also be broadcasted through the blind authorization message #1 or the system.
  • the transmission configuration message #1 is carried in the text, which is not limited in this embodiment of the present application.
  • the blind authorization message #1 carries the first DMRS and/or the second DMRS sequence.
  • the blind authorization message #1 may only carry the first DMRS sequence, and the second DMRS sequence may be based on the first DMRS sequence and the preset. The formula is obtained.
  • the blind authorization message #1 may only carry the second DMRS sequence, and the first DMRS sequence may be obtained according to the second DMRS sequence and a preset formula.
  • the blind authorization message #1 may carry both the first DMRS sequence and the second DMRS sequence.
  • the blind authorization message #1 may carry only the second DMRS sequence, and the first DMRS sequence is already carried in other interactions between the terminal device and the network device, which is not limited in this embodiment of the present application.
  • transmission resource #D the transmission resource of the transmission indication information #2 and/or the indication information #3.
  • the terminal device may transmit the indication information #2 only on the transmission resource #D, or may transmit the indication information #3 only on the transmission resource #D, or simultaneously transmit the indication information #2 and the indication information #3 on the transmission resource #D.
  • the transmission resource #D may be a resource in parallel with the transmission resource #1.
  • the transmission resource #D in parallel with the transmission resource #1 means that both exist at the same time or are simultaneously released.
  • the transmission resource #D may be located at a fixed location in the transmission resource #1, that is, the transmission resource #D is a fixed resource in the transmission resource #1.
  • the transmission resource #D may be located at a fixed position in the transmission resource #1.
  • the transmission resource #D may also be a resource other than the transmission resource #1, that is, the transmission resource #D does not overlap with the transmission resource #1.
  • the transmission resource #D may be a control information transmission resource, and may be located in the physical uplink control channel, but the embodiment of the present application does not limit this.
  • the transmission resource #D may be pre-defined, or may be obtained according to the location of the transmission resource #1, or may be indicated by the resource indication information #B, which is not limited in this embodiment of the present application.
  • the resource indication information #B is used by the terminal device to determine the transmission resource #D, that is, the terminal device can determine the transmission resource #D according to the resource indication information #B.
  • the resource indication information #B may be carried by the blind authorization message #1, or may be carried by the system broadcast information, or may be carried by the transmission configuration message #1 in the above S501, which is not limited in this embodiment of the present application.
  • the method may further include:
  • the terminal device sends the indication information #4 to the network device (that is, an example of the fourth indication information).
  • S505a and S505b may be executed one by one, but the embodiment of the present application does not limit this.
  • the indication information #4 is used to indicate whether the terminal device needs to transmit to the network device other data than the data #1 after transmitting the data #1, and whether other transmission resources different from the transmission resource #1 are needed.
  • the indication information #4 may be a fifth DMRS sequence, and the fifth DMRS sequence may indicate that the terminal device does not need to transmit data other than the data #1 to the network device after the data #1 is transmitted, and naturally indicates the terminal. The device does not require other transmission resources than transmission resource #1.
  • the indication information #4 may be a sixth DMRS sequence, and the sixth DMRS sequence indicates that the terminal device needs to transmit to the network device other than the data #1 after the data #1 is transmitted, but does not need to be different from the transmission resource. #1 other transmission resources.
  • the terminal device transmits a small number of times, for example one or two times, using the transmission resource #1, and can transmit all the data that the terminal device needs to send to the network device, such as the first data, without having to obtain other Transmission resources.
  • the indication information #4 may be a seventh DMRS sequence, and the seventh DMRS sequence indicates that the terminal device needs other transmission resources different from the transmission resource #1, implicitly indicating that the terminal device still has the data after the data #1 is transmitted. Other data outside of 1 needs to be transmitted to the network device.
  • the indication information #4 may be two-bit information, and "00", “01", and “10" respectively indicate the above three meanings, but the embodiment of the present application does not limit the number of bits occupied by the indication information #4.
  • the specific meaning of the bit value is also not limited.
  • the meaning of the indication, and the resource of the transmission instruction information #4 reference may be made to the description of the instruction information #2 and the instruction information #3 in the above, and for brevity, details are not described herein again.
  • the corresponding content of the fifth DMRS sequence, the sixth DMRS sequence, and the seventh DMRS sequence such as by what kind of information carrying, etc., reference may be made to the foregoing first DMRS sequence, second DMRS sequence, third DMRS sequence, and/or Or the description of the fourth DMRS sequence is not repeated here.
  • first DMRS sequence, the third DMRS sequence, and the fifth DMRS sequence may be equal or unequal, and the embodiment of the present application does not limit this.
  • the second DMRS sequence and the second DMRS sequence may be equal or unequal, which is not limited by the embodiment of the present application.
  • different terminal devices may use the same or different DMRS sequences as the indication information #2, the indication information #3, and/or the indication information #4, which is not limited by the embodiment of the present application.
  • FIG. 6 shows a schematic interaction diagram of a transmission method 600 of one embodiment of the present application. It should be understood that the method 600 illustrated in Figure 6 is for illustrative purposes only and should not be construed as limiting the application.
  • the network device sends a transmission configuration message #1 to the terminal device.
  • the transmission configuration information #1 includes a B-RNTI #1, a transmission period P, a third DMRS sequence, and a fourth DMRS sequence.
  • the DMRS is a reference signal when the terminal device transmits data.
  • each terminal device uses a dedicated DMRS sequence as the identifier of the terminal device, so that the network device transmits the resource through the DMRS when receiving the transmission on one CTU.
  • the DMRS sequence identifies which terminal device this transmission comes from. Due to the limited resources of the DMRS sequence, one terminal device can only allocate one DMRS sequence for the unlicensed transmission in the CTA. However, in the authorized transmission, the data transmission of the terminal device is performed on the specified authorized data transmission resource, and the network device does not need to identify which terminal device is transmitting according to the DMRS sequence. Therefore, in authorized transmission, the terminal device can use any DMRS sequence.
  • the terminal device can use a DMRS sequence in the blind authorization transmission after the GF2GB.
  • the terminal device performs an unauthorized transfer.
  • the terminal device uses an unlicensed transmission after generating the URLLC data.
  • the specific process of unauthorized transfer is not detailed here. If the unauthorized transfer is successful, the transfer process ends and does not go to the next step. If the GF2GB process is triggered if the license-free transmission fails or the trigger condition of the GF2GB is met during the unauthorized transfer, the process proceeds to step S603. At what time does the specific network device initiate the GF2GB process, which is not specified in this application.
  • the network device sends a blind authorization message #1 to the terminal device.
  • the network device learns that the terminal device is performing the unlicensed transmission by detecting the DMRS sequence of the CTU. However, when the data transmitted by the terminal device is not successfully received for the first time or multiple times, the GF2GB process is started, and the blind authorization message #1 is sent to the terminal device.
  • Authorization message #1 contains information for transmission resource #1.
  • the CRC of the blind authorization message #1 is scrambled using the B-RNTI #1 configured to the terminal device.
  • the terminal device may try to receive the blind authorization message by using the B-RNTI #1 in each subsequent unlicensed transmission period or time slot. If the blind authorization message #1 sent by the network device to itself is received, Then, the information of the transmission resource #1 can be obtained from the blind authorization message #1.
  • the terminal device transmits the data #1 and the fourth DMRS sequence on the transmission resource #1.
  • the data #1 is a part of the first data.
  • the terminal device simultaneously transmits a fourth DMRS sequence to the network device, indicating that the terminal device needs other transmission resources different from the transmission resource #1, that is, the terminal device needs a larger transmission resource, that is, the terminal device needs to transmit the data #1.
  • MR 1.
  • the network device sends an ACK to the terminal device.
  • the network device correctly receives the data #1 of the terminal device, the feedback ACK indicates that the data #1 of the terminal device is received.
  • the network device receives data, it needs to judge whether the terminal device needs more transmission resources to transmit uplink data according to the MR indication transmitted by the terminal device. If the terminal device does not need a larger transmission resource, the transmission resource #1 may be reserved for the terminal device so that the terminal device transmits more data. If the terminal device needs a larger transmission resource, the network device can immediately authorize the terminal device to be larger. Transmission resources.
  • the network device sends a blind authorization message #2 to the terminal device.
  • the blind authorization message #2 includes the information of the transmission resource #2, and the CRC of the blind authorization message #2 is scrambled using the B-RNTI #1 configured to the terminal device.
  • the network device correctly receives the data #1 sent by the terminal device, and feeds back the ACK to the terminal device, and because the terminal device indicates that the terminal device needs a larger transmission resource, the network device allocates a larger transmission resource to the terminal device.
  • the transmission resource #2 whose size is larger than the transmission resource #1 is allocated by the network device, and the transmission resource #1 is recovered or released as an example for description.
  • the terminal device transmits the data #2 and the third DMRS sequence on the transmission resource #2.
  • the data #2 includes other portions of the first data other than the data #1. Moreover, the data #2 may further include other data than the other portions of the first data except the data #1, which is not limited by the embodiment of the present application.
  • the network device sends a NACK to the terminal device.
  • the terminal device determines whether the network device authorizes the terminal device with a larger transmission resource is only related to the MR indication, and has nothing to do with whether the data is successfully received this time. If the data reception fails this time, and the network device authorizes the terminal device with a larger transmission resource, the terminal device retransmits the data of the last transmission failure and more first transmissions on the larger transmission resource in the next transmission. data.
  • the terminal device retransmits the data #2 on the transmission resource #2, and transmits the third DMRS sequence.
  • the network device sends an ACK to the terminal device.
  • the network device successfully receives the data sent by the terminal device, that is, data #2, and sends an ACK to the terminal device.
  • the network device releases the transmission resource #2.
  • the network device releases the resource authorized to the terminal device, that is, the transmission resource #2.
  • the network device can immediately authorize the transmission resource to the terminal device by using the first authorization message, so that the terminal device can use the transmission resource to transmit the data of the unauthorized transmission failure.
  • the purpose of fast transfer authorization transfer after the unauthorized transfer failure can be achieved, thereby reducing the transmission delay.
  • FIG. 7 is a schematic interaction diagram of a transmission method according to another embodiment of the present application. It should be understood that FIG. 7 illustrates detailed steps or operations of method 700, but these steps or operations are merely examples, and other embodiments of the present application may perform other operations or only some of the operations of FIG.
  • the method 700 can be performed by a network device and a terminal device.
  • the network device may be the network device 101 in the system 100
  • the terminal device may be the terminal device 102 or the terminal device 103 in the system 100.
  • the network device sends a blind authorization message #3 (ie, an example of the first authorization message) to the terminal device.
  • a blind authorization message #3 ie, an example of the first authorization message
  • the blind authorization message #3 is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device fails to transmit the first data without authorization.
  • the blind authorization message #3 includes resource indication information #C (ie, an example of the first resource indication information), the resource indication information #C indicates the transmission resource #3 (ie, an example of the first transmission resource), and the transmission resource #3 uses at least Transmitting a resource request message to the terminal device.
  • the network device determines that the terminal device may send the blind authorization message #3 to the terminal device after the unauthorized transmission fails, and the blind authorization message #3 may include information of the transmission resource #3 (ie, an example of the blind authorization resource). That is, the resource indication information #C (that is, an example of the first resource indication information).
  • the terminal device can determine the transmission resource #3 by using the resource indication information #C in the blind authorization message #3, and the terminal device can send the resource request message to the network device at least on the transmission resource #3.
  • blind authorization message #3 may be the blind authorization message described above.
  • details refer to the above description, and for brevity, no further details are provided herein.
  • the transmission resource #3 is different from the blind authorization resource in the above, that the blind authorization resource is used for the terminal device to transmit data, and the transmission resource #3 can be used for the terminal device to send the resource request message. If the size of the transmission resource #3 is larger than the size of the resource required to transmit a resource request message, the transmission resource #3 can also be used for the terminal device to transmit data.
  • the blind authorization message #3 may include the indication information #5.
  • the indication information #5 is used to indicate that the blind authorization message #3 is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device is not authorized to transmit the first data. If the terminal device detects that the blind authorization message #3 includes the indication information #5, it may be determined that the blind authorization message #3 is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device is not authorized to transmit the first data. And the transmission resource #3 can be determined according to the resource indication information #C in the blind authorization message #3.
  • indication information #5 may be the indication information #1 in the above, and may specifically refer to the description of the indication information #1 in the above, and for brevity, no further details are provided herein.
  • the cyclic redundancy check code CRC in the blind authorization message #3 may be scrambled by using the second identifier.
  • the second flag is referred to as B-RNTI #2.
  • the downlink message is a blind authorization message.
  • the network device may use the CRC in the B-RNTI #2 scrambled blind authorization message #3, and if the terminal device uses the B-RNTI #2 to descramble the blind authorization message #3, the blind authorization message may be determined.
  • 3 is a blind authorization message.
  • the terminal device may attempt to use the B-RNTI #2 to descramble the CRC in the downlink message in each subsequent transmission period, such as an unlicensed transmission period. If the descrambling is successfully performed by using the B-RNTI #2, the terminal device may determine that the downlink message is a blind authorization message.
  • the B-RNTI #2 may be the same as or different from the B-RNTI #1, which is not limited by the embodiment of the present application.
  • the method may further include:
  • the network device sends a transmission configuration message #2 (ie, an example of a transmission configuration message) to the terminal device.
  • the transmission configuration message #2 may include a second identifier, that is, B-RNTI #2.
  • the terminal device may try to use the B-RNTI# in each subsequent transmission period for transmitting the service data of the terminal device, for example, an unauthorized transmission period. 2 De-scrambling the CRC in the downlink message. If the descrambling is successful by using the B-RNTI #2, the terminal device can determine that the downlink message is a blind authorization message, and thus obtain a blind authorization resource.
  • the transmission configuration message #2 may be an RRC message, a MAC CE, or the like, which is not limited in this embodiment of the present application.
  • the terminal device sends a resource request message to the network device on the transmission resource #3.
  • the resource request message includes resource requirement information indicating the size of the data #4 (ie, an example of the second data) or the size of the transmission resource required to transmit the data #4.
  • the resource request message can be a BSR or BSR message.
  • the network device may determine the data to be transmitted by the terminal device, that is, the size of the data #4, or may determine the size of the transmission resource required by the terminal device.
  • the data #4 is part or all of the first data.
  • the terminal device may further send the data #5 to the network device in the transmission resource #3 in S704.
  • the data #5 is all the data except the data #4 in the first data. That is, the first data is composed of data #4 and data #5.
  • the terminal device can simultaneously transmit the resource request message and a part of the first data on the transmission resource #3.
  • the network device sends an authorization message #1 to the terminal device (that is, an example of the second authorization message).
  • the authorization message #1 includes resource indication information #D (that is, an example of the second resource indication information).
  • the resource indication information #D indicates the transmission resource #4 (that is, an example of the second transmission resource), and the transmission resource #4 is used for the terminal device to transmit the data #4.
  • the network device may determine the size of the transmission resource required by the terminal device. Then, the network device authorizes the transmission resource #4 to the terminal device through the authorization message #1 to cause the terminal device to transmit the data #4 on the transmission resource #4.
  • the transmission resource #4 authorized in the authorization message #1 is no longer blind, but is explicitly allocated according to the demand indicated in the resource request message, and may be the same as the normal authorization transmission. Therefore, the authorization message #1 may not be a blind authorization message, but a conventional uplink authorization message.
  • the terminal device sends data #4 to the network device on the transmission resource #4.
  • the data #4 in S708 is all of the first data. If the size of the transmission resource #3 is larger than the size of the resource required to transmit one resource request message, and the terminal device transmits the data #5 on the transmission resource #3 in S704, the data #4 is the data in the first data. All data outside of 5.
  • the method may further include:
  • the network device can immediately release the transmission resource #4.
  • the network device can immediately release the transmission resource #4 in the case of correctly receiving the data #4, regardless of whether the terminal device has more data to transmit. Increased resource utilization.
  • the network device authorizes the resource for transmitting the resource request message to the terminal device by using the first authorization message, and the terminal device sends the resource request message to the network device according to the first authorization message.
  • the network device can allocate sufficient resources for the terminal device in the second authorization message according to the resource request message, so that the terminal device can transmit all the data that needs to be transmitted at one time, and realize the fast transfer authorization transmission after the unauthorized transfer failure occurs. the goal of.
  • the method in the embodiment of the present application can reduce the transmission delay.
  • the terminal device although the terminal device also sends the resource request message, because the terminal device does not send the resource request message, the terminal device can obtain the resource for transmitting the resource request message, so the letter can be reduced. Reduce overhead and reduce transmission delays.
  • the blind authorization message #3 may further include resource indication information #E (ie, an example of the third resource indication information).
  • the resource indication information #E is used to indicate the transmission resource #5 (that is, an example of the third transmission resource), and the transmission resource #5 transmits part or all of the first data by the terminal device.
  • the method may further include:
  • the terminal device transmits data #5 on the transmission resource #5.
  • the terminal device may send a resource request message to the network device on the transmission resource #3, and transmit the resource request message. A part of the first data is sent to the network device on resource #5.
  • the transmission resource #3 may be a resource in the uplink control channel resource, but the embodiment of the present application does not limit this.
  • S705 may be performed simultaneously with S704, or may be performed before S704 or before S704, which is not limited by the embodiment of the present application.
  • the terminal device in S705 transmits data #5 on the transmission resource #5, which is equivalent to if the size of the transmission resource #3 is larger than the size of the resource required to transmit one resource request message, and the terminal device in S704 can transmit the resource. #3 Send data #5 to the network device.
  • FIG. 8 shows a schematic interaction diagram of a transmission method 800 of one embodiment of the present application. It should be understood that the method 800 illustrated in FIG. 8 is merely illustrative and should not be construed as limiting the application.
  • the network device sends a transmission configuration message #2 to the terminal device.
  • the transmission configuration information #2 includes B-RNTI #2.
  • the terminal device performs an unauthorized transfer.
  • the terminal device uses an unlicensed transmission after generating the URLLC data.
  • the specific process of unauthorized transfer is not detailed here. If the unauthorized transfer is successful, the transfer process ends and does not go to the next step. If the GF2GB process is triggered if the license-free transmission fails or the trigger condition of the GF2GB is met during the unauthorized transfer, the process proceeds to step S803. At what time does the specific network device initiate the GF2GB process, which is not specified in this application.
  • the network device sends a blind authorization message #3 to the terminal device.
  • the network device learns that the terminal device is performing the unlicensed transmission by detecting the DMRS of the CTU, but starts the GF2GB process to the terminal when the data transmitted by the terminal device is not successfully received for the first time or multiple times.
  • the device sends a blind authorization message #3, which contains the information of the transmission resource #3.
  • the CRC of the blind authorization message #3 is scrambled using the B-RNTI #2 configured to the terminal device.
  • the terminal device may try to use the B-RNTI #2 to receive the blind authorization message in each subsequent unlicensed transmission period or time slot. If the blind authorization message sent by the network device to the user is received, the slave message is received. Get the information of transmission resource #3.
  • a resource request message and data #5 can be transmitted by the size of the transmission resource #3 as an example. That is, the first data is composed of data #4 and data #5.
  • the terminal device transmits the resource request message and the data #5 on the transmission resource #3.
  • the resource request message is used to indicate the size of the data #4 or the resource size required to transmit the data #4.
  • the network device sends an ACK to the terminal device.
  • the network device if the network device correctly receives the data #5 of the terminal device, the ACK is fed back to the terminal device. Moreover, the network device can immediately reclaim or release the previously authorized transmission resource #3.
  • the NACK may be fed back to the terminal device, and the authorized transmission resource #3 may be reserved for the terminal device to retransmit the data.
  • the network device can detect whether there is a resource request message that is simultaneously transmitted by the terminal device each time the data is received. If the resource request message is received, the network resource can be immediately reclaimed regardless of whether the previously authorized transmission resource is correctly received. And assigning a new transmission resource to the terminal device according to the information in the resource request message. If the previous transmission is correctly received, the network device only needs to allocate the transmission resource capable of transmitting the remaining data to the terminal device. If the previous transmission fails to receive correctly, the network device may only allocate the transmission resource capable of transmitting all the data for the terminal device. It is also possible to reserve the previously allocated transmission resource and additionally allocate a new transmission resource that can transmit the remaining data, so that the terminal device can retransmit the previously incorrectly transmitted data on the previous transmission resource and transmit the remaining data on the new transmission resource.
  • the network device sends an authorization message #1 to the terminal device.
  • the CRC of Authorization Message #1 is scrambled with B-RNTI #2.
  • the network device authorizes the transmission resource #4 to the terminal device by transmitting the authorization message #1 to the terminal device.
  • the transmission resource #4 may be completely a resource different from the transmission resource #3, and the transmission resource #3 is reclaimed. If the data #5 is not successfully transmitted, the size of the transmission resource #4 may be larger than the transmission resource #3, and the terminal device may transmit all the data to be transmitted, that is, the first data, on the transmission resource #4.
  • the transmission resource #4 may also be a transmission resource added on the basis of the transmission resource #3, and the transmission resource #3 is still reserved for retransmitting the data that was not successfully transmitted last time, that is, the data #5, and the transmission resource #4 is transmitted. The remaining data, data #4.
  • the terminal device transmits data #4 on the transmission resource #4.
  • the network device sends a NACK to the terminal device.
  • the network device fails to correctly receive the data #4 transmitted by the terminal device on the transmission resource #4, and feeds back the NACK to the terminal device to indicate that the data is not correctly received.
  • the terminal device retransmits the data #4 on the transmission resource #4.
  • the network device sends an ACK to the terminal device.
  • the network device correctly receives the data #4 transmitted by the terminal device on the transmission resource #4, and feeds back an ACK to the terminal device to indicate that the data is correctly received.
  • the network device releases the transmission resource #4.
  • the transmission resource #4 can be released immediately.
  • the network device authorizes the resource for transmitting the resource request message to the terminal device by using the first authorization message, and the terminal device sends the resource request message to the network device according to the first authorization message.
  • the network device can allocate sufficient resources for the terminal device in the second authorization message according to the resource request message, so that the terminal device can transmit all the data that needs to be transmitted at one time, and realize the fast transfer authorization transmission after the unauthorized transfer failure occurs. the goal of.
  • the method in the embodiment of the present application can reduce the transmission delay.
  • a transmission method according to an embodiment of the present application has been described above with reference to FIGS. 5 through 8.
  • the terminal device and the network device provided by the embodiments of the present application are combined with FIG. 9 to FIG.
  • FIG. 9 is a schematic block diagram of a terminal device 900 provided by an embodiment of the present application.
  • the terminal device 900 includes a receiving unit 910 and a transmitting unit 920.
  • the receiving unit 910 is configured to receive a first authorization message sent by the network device, where the first authorization message is that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device fails to transmit the first data without authorization.
  • the first authorization message includes resource indication information, where the resource indication information is used to indicate a first transmission resource, where the first transmission resource is used by the terminal device to continuously use the first data. ;
  • the sending unit 920 is configured to send, by using the first transmission resource, second data to the network device, where the second data is part or all of the first data.
  • the sending unit 920 is further configured to:
  • the sending unit 920 is further configured to:
  • the second data is carried by the first data frame, where the first data frame further carries first indication information, where the first indication information is used to indicate that the terminal device is transmitting the second data. Whether there is any other data other than the second data to be transmitted using the first transmission resource.
  • the first indication information is a DMRS sequence sent on a DMRS resource in the first transmission resource
  • the terminal device is instructed to use the first transmission resource to transmit data other than the second data after the second data is transmitted.
  • the first indication information is a second DMRS sequence, indicating that the terminal device needs to use the first transmission resource to transmit other data after the second data is transmitted after the second data is transmitted.
  • the second data is carried by the second data frame, where the second data frame further carries the second indication information, where the second indication information is used to indicate whether the terminal device needs to be different from the first Other transmission resources of the transmission resource.
  • the second indication information is a DMRS sequence sent on a DMRS resource in the first transmission resource
  • the second indication information is a third DMRS sequence, indicating that the terminal device does not need other transmission resources different from the first transmission resource;
  • the second indication information is a fourth DMRS sequence, indicating that the terminal device needs other transmission resources different from the first transmission resource.
  • the receiving unit 910 is further configured to:
  • the sending unit 920 is further configured to:
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the receiving, by the receiving unit 910, the first authorization message sent by the network device includes:
  • the network device And using the first identifier to descramble the CRC of the at least one downlink message sent by the network device, to receive the first authorization message, where the downlink message scrambled by using the first identifier is the network device And transmitting, to the terminal device, a message for transmitting a resource, after detecting that the terminal device fails to authorize the transmission of the first data.
  • the first authorization message includes third indication information, where the third indication information is used to indicate that the first authorization message is that the network device detects that the terminal device is not authorized to transmit the first After the data fails, the terminal device is authorized to transmit a message of the resource.
  • the receiving unit 910 before receiving the first authorization message sent by the network device, the receiving unit 910 is further configured to:
  • the terminal device 900 herein is embodied in the form of a functional unit.
  • the term "unit" as used herein may refer to an application specific integrated circuit (ASIC), an electronic circuit, a processor (eg, a shared processor, a proprietary processor, or a group) for executing one or more software or firmware programs. Processors, etc.) and memory, merge logic, and/or other suitable components that support the described functionality.
  • ASIC application specific integrated circuit
  • the terminal device 900 may be specifically the terminal device in the foregoing method 500 and the method 600.
  • the terminal device 900 may be used to perform the foregoing method 500 and method 600.
  • the various processes and/or steps corresponding to the terminal device are not repeated here to avoid repetition.
  • FIG. 10 is a schematic block diagram of a network device 1000 provided by an embodiment of the present application.
  • the network device 1000 includes a transmitting unit 1010 and a receiving unit 1020.
  • the sending unit 1010 is configured to send a first authorization message to the terminal device, where the first authorization message is that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device fails to transmit the first data without authorization.
  • the first authorization message includes resource indication information, where the resource indication information is used to indicate a first transmission resource, where the first transmission resource is used by the terminal device to use the first data multiple times in succession;
  • the receiving unit 1020 is configured to detect, by using the first transmission resource, second data that is sent by the terminal device, where the second data is part or all of the first data.
  • the sending unit 1010 is further configured to:
  • the receiving unit 1020 does not correctly receive the second data sent by the terminal device, send a negative acknowledgement NACK to the terminal device;
  • the receiving unit 1020 is further configured to receive, by using the first transmission resource, the second data that is retransmitted by the terminal device.
  • the sending unit 1010 is further configured to:
  • the receiving unit 1020 correctly receives the second data sent by the terminal device, sending an acknowledgement ACK to the terminal device;
  • the receiving unit 1020 is further configured to: detect third data sent by the terminal device on the first transmission resource, where the third data is data other than the second data in the first data. Some or all of them.
  • the receiving unit 1020 is further configured to:
  • the network device further includes:
  • a first determining unit configured to determine, according to the first indication information, whether the terminal device needs to use the first transmission resource to transmit other data other than the second data after transmitting the second data .
  • the first indication information is a DMRS sequence sent on a DMRS resource in the first transmission resource
  • the first determining unit determines, according to the first indication information, whether the terminal device needs to use the first transmission resource after the second data is transmitted after the second data is transmitted.
  • the transmission specifically includes:
  • the network device determines that the terminal device does not have other data other than the second data after transmitting the first data. Transmitting using the first transmission resource;
  • the network device determines that the terminal device has other data than the second data after transmitting the first data.
  • the first transmission resource transmission needs to be used.
  • the receiving unit 1020 is further configured to:
  • the network device further includes:
  • a second determining unit configured to determine, according to the second indication information, whether the terminal device requires other transmission resources different from the first transmission resource.
  • the second indication information is a DMRS sequence sent on a modulation and demodulation reference signal DMRS resource in the first transmission resource;
  • the determining, by the second determining unit, according to the second indication information, whether the terminal device needs another transmission resource different from the first transmission resource specifically includes:
  • the network device determines that the terminal device does not need other transmission resources different from the first transmission resource
  • the network device determines that the terminal device needs another transmission resource different from the first transmission resource.
  • the sending unit 1010 is further configured to:
  • the network device sends a second authorization message to the terminal device, where the second authorization message is used to indicate the second transmission resource;
  • the receiving unit 1020 is further configured to detect fourth data sent by the terminal device on the second transmission resource.
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the first authorization message includes third indication information, where the third indication information is used to indicate that the first authorization message is that the network device detects that the terminal device is authorized to transmit the first After the data fails, the terminal device is authorized to transmit a message of the resource.
  • the sending unit 1010 before sending the first authorization message to the terminal device, is further configured to:
  • the network device 1000 herein is embodied in the form of a functional unit.
  • the term "unit" as used herein may refer to an ASIC, an electronic circuit, a processor (eg, a shared processor, a proprietary processor or a group processor, etc.) and memory, a merge logic, and a processor for executing one or more software or firmware programs. / or other suitable components that support the described functionality.
  • the network device 1000 may be specifically the network device in the foregoing method 500 and the method 600.
  • the network device 1000 may be used to perform the foregoing method 500 and method 600.
  • the various processes and/or steps corresponding to the network device are not repeated here to avoid repetition.
  • FIG. 11 is a schematic block diagram of another terminal device 1100 provided by an embodiment of the present application.
  • the terminal device 1100 includes a receiving unit 1110 and a transmitting unit 1120.
  • the receiving unit 1110 is configured to receive a first authorization message sent by the network device, where the first authorization message is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device fails to transmit the first data without authorization.
  • the first authorization message includes first resource indication information, where the first resource indication information indicates a first transmission resource, and the first transmission resource is used at least for the terminal device to transmit a resource request message;
  • the sending unit 1120 is configured to send, by using the first transmission resource, a resource request message to the network device, where the resource request message includes resource requirement information, where the resource requirement information indicates a size of the second data or transmits the The size of the transmission resource required by the second data, the second data being part or all of the first data;
  • the receiving unit 1110 is further configured to receive a second authorization message sent by the network device, where the second authorization message includes second resource indication information, and the second resource indication information indicates a second transmission resource, where the Two transmission resources are used by the terminal device to transmit the second data;
  • the sending unit 1120 is further configured to send the second data to the network device on the second transmission resource.
  • the size of the first transmission resource is greater than a size of a resource required to transmit the resource request message, and the second data is a part of the first data;
  • the sending, by the sending unit 1120, the resource request message to the network device on the first transmission resource includes:
  • the sending unit 1120 sends third data and the resource request message to the network device on the first transmission resource, where the third data is all except the second data in the first data. data.
  • the first authorization message further includes third resource indication information, where the third resource indication information is used to indicate a third transmission resource, and the third transmission resource is used by the terminal device to transmit the first Part or all of the data;
  • the sending unit 1120 is further configured to:
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the receiving, by the receiving unit 1110, the first authorization message sent by the network device includes:
  • the receiving unit 1110 uses the first identifier to descramble the at least one downlink message sent by the network device, to receive the first authorization message, where the downlink message scrambled by using the first identifier is
  • the network device authorizes the terminal device to transmit a message of the resource after detecting that the terminal device is unauthorised to transmit the first data.
  • the receiving unit 1120 is further configured to:
  • the terminal device 1100 herein is embodied in the form of a functional unit.
  • the term "unit" as used herein may refer to an ASIC, an electronic circuit, a processor (eg, a shared processor, a proprietary processor or a group processor, etc.) and memory, a merge logic, and a processor for executing one or more software or firmware programs. / or other suitable components that support the described functionality.
  • the terminal device 1100 may be specifically the terminal device in the foregoing method 700 and the method 800, and the terminal device 1100 may be used to perform the foregoing method 700 and method 800 in the embodiment.
  • the various processes and/or steps corresponding to the terminal device are not repeated here to avoid repetition.
  • FIG. 12 is a schematic block diagram of another network device 1200 provided by an embodiment of the present application.
  • the network device 1200 includes a transmitting unit 1210 and a receiving unit 1220.
  • the sending unit 1210 is configured to send a first authorization message to the terminal device, where the first authorization message is a message that the network device authorizes the transmission resource to the terminal device after detecting that the terminal device fails to transmit the first data without authorization.
  • the first authorization message includes first resource indication information, where the first resource indication information indicates a first transmission resource, and the first transmission resource is used at least for the terminal device to transmit a resource request message;
  • the receiving unit 1220 is configured to receive a resource request message sent by the terminal device on the first transmission resource, where the resource request message includes resource requirement information, where the resource requirement information indicates a size of the second data or the transmission The size of the transmission resource required by the second data, the second data being part or all of the first data;
  • the sending unit 1210 is further configured to send a second authorization message to the terminal device, where the second authorization message includes second resource indication information, the second resource indication information indicates a second transmission resource, and the second Transmitting resources for the terminal device to transmit the second data;
  • the receiving unit 1220 is further configured to receive the second data that is sent by the terminal device on the second transmission resource.
  • the size of the first transmission resource is greater than a size of a resource required to transmit the resource request message, and the second data is a part of the first data;
  • the receiving, by the receiving unit 1220, the resource request message sent by the terminal device on the first transmission resource includes:
  • the receiving unit 1220 receives the third data and the resource request message sent by the terminal device on the first transmission resource, where the third data is other than the second data in the first data. All data.
  • the first authorization message further includes third resource indication information, where the third resource indication information is used to indicate a third transmission resource, and the third transmission resource is used by the terminal device to transmit the first Part or all of the data;
  • the receiving unit 1220 is specifically configured to:
  • the cyclic redundancy check code CRC in the first authorization message is scrambled by using the first identifier
  • the sending unit 1210 is further configured to:
  • the network device 1200 herein is embodied in the form of a functional unit.
  • the term "unit" as used herein may refer to an ASIC, an electronic circuit, a processor (eg, a shared processor, a proprietary processor or a group processor, etc.) and memory, a merge logic, and a processor for executing one or more software or firmware programs. / or other suitable components that support the described functionality.
  • the network device 1200 may be specifically the network device in the foregoing method 700 and the method 800.
  • the network device 1200 may be used to perform the foregoing method 700 and method 800.
  • the various processes and/or steps corresponding to the network device are not repeated here to avoid repetition.
  • FIG. 13 shows a terminal device 1300 provided by an embodiment of the present application.
  • the terminal device 1300 can include a processor 1310, a transceiver 1320, and a memory 1330 that communicate with one another via internal connection paths.
  • the related functions implemented by the receiving unit 910, the transmitting unit 920, the receiving unit 1110, and the transmitting unit 1120 can be implemented by the processor 1310 controlling the transceiver 1320.
  • the processor 1310 may include one or more processors, for example, including one or more central processing units (CPUs).
  • processors for example, including one or more central processing units (CPUs).
  • CPUs central processing units
  • the CPU may be a single core CPU, and It can be a multi-core CPU.
  • the transceiver 1320 is configured to transmit and receive data and/or signals, as well as to receive data and/or signals.
  • the transceiver can include a transmitter and a receiver for transmitting data and/or signals, and a receiver for receiving data and/or signals.
  • the memory 1330 includes, but is not limited to, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read only memory (EPROM), and a read only memory.
  • RAM random access memory
  • ROM read-only memory
  • EPROM erasable programmable read only memory
  • CD-ROM compact disc read-only memory
  • the memory 1330 is used to store program code and data of the terminal device, and may be a separate device or integrated in the processor 1310.
  • the processor 1310 is configured to control a transceiver to perform information transmission with a network device.
  • a transceiver to perform information transmission with a network device.
  • Figure 13 only shows a simplified design of the terminal device.
  • the terminal device may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all terminal devices that can implement the present application are protected by the present application. Within the scope.
  • the terminal device 1300 can be replaced with a chip device, for example, a communication chip that can be used in the terminal device for implementing related functions of the processor 1310 in the terminal device.
  • the chip device can be a field programmable gate array for implementing related functions, a dedicated integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, or a programmable controller or other integrated chip.
  • the chip may include one or more memories for storing program code that, when executed, causes the processor to perform the corresponding functions.
  • FIG. 14 shows a network device 1400 provided by an embodiment of the present application.
  • the network device can include a processor 1410, a transceiver 1420, and a memory 1430 that communicate with one another via internal connection paths.
  • the related functions implemented by the first processing unit and the second processing unit in the above may be implemented by the processor 1410, and the related functions implemented by the sending unit 1010, the receiving unit 1020, the sending unit 1210, and the receiving unit 1220 may be performed by the processor 1410.
  • Control transceiver 1420 is implemented.
  • the processor 1410 may include one or more processors, for example, including one or more CPUs.
  • the processor may be a single core CPU or a multi-core CPU.
  • the transceiver 1420 is configured to transmit and receive data and/or signals, as well as to receive data and/or signals.
  • the transceiver can include a transmitter and a receiver for transmitting data and/or signals, and a receiver for receiving data and/or signals.
  • the memory 1430 includes, but is not limited to, a RAM, a ROM, an EPROM, a CD-ROM, and the memory 1430 is used to store related instructions and data.
  • the memory 1430 is used to store program code and data of the network device, and may be a separate device or integrated in the processor 1410.
  • the processor 1410 is configured to control transceivers to perform information transmission with the terminal device.
  • the processor 1410 is configured to control transceivers to perform information transmission with the terminal device.
  • Figure 14 only shows a simplified design of the network device.
  • the network device may also include other necessary components, including but not limited to any number of transceivers, processors, controllers, memories, etc., and all network devices that can implement the present application are protected by the present application. Within the scope.
  • network device 1400 can be replaced with a chip device, such as a communication chip that can be used in a network device for implementing related functions of processor 1410 in the network device.
  • the chip device can be a field programmable gate array for implementing related functions, a dedicated integrated chip, a system chip, a central processing unit, a network processor, a digital signal processing circuit, a microcontroller, or a programmable controller or other integrated chip.
  • the chip may include one or more memories for storing program code that, when executed, causes the processor to perform the corresponding functions.
  • the base station in the following may be the network device in the above
  • the user equipment may be the terminal device in the above.
  • a blind authorization transmission method for a user equipment comprising:
  • the first data is retransmitted in the first uplink data transmission resource of the second transmission period.
  • the blind authorization transmission configuration message may be a configuration message of a radio resource control layer.
  • the blind authorization scrambling code may be a radio network temporary identifier of the user equipment, that is, a B-RNTI, and the B-RNTI is a temporary identifier different from the C-RNTI and the SPS-RNTI in the existing specifications.
  • the blind authorization message used to identify the received blind authorization message is a blind authorization message for authorization for blind authorization transmission.
  • the blind authorization message may be a blind authorization message in an existing specification, and the blind authorization scrambling code is used to scramble transmission.
  • the method further includes: performing an unauthorized data transmission, and detecting whether a blind authorization message exists in the process of the unauthorized transmission or the end of the unauthorized transmission.
  • the first blind authorization message may terminate the unlicensed transmission if the unlicensed transmission is still in progress, and use the uplink data transmission resource authorized in the blind authorization message to perform the authorized transmission.
  • the uplink data transmission resource authorized in the blind authorization message may continue to reserve a certain time for the user equipment when the transmission of the user equipment is detected on the transmission resource, and the base station may exceed a certain time.
  • the resource is released after the transmission of the user equipment is not detected on the transmission resource.
  • the first transmission period is not limited to a period corresponding to the first transmission of the user equipment after receiving the first blind authorization message.
  • the first data is not limited to the data that is first transmitted by the user equipment after receiving the first blind authorization message.
  • the demodulation reference signal is used by the receiving end as a reference signal to receive transmission signals on other transmission resources.
  • the relative fixed position of the demodulation reference signal transmission resource in the data transmission resource does not require the base station to additionally indicate the location of the demodulation reference signal transmission resource.
  • Demodulation reference signal transmission resources can transmit different simple sequences, and different sequences can be used to indicate different meanings.
  • the user equipment uses the correct demodulation reference signal sequence to indicate to the base station whether there is more data when transmitting the uplink data using the uplink data transmission resource authorized by any blind authorization message at any time.
  • the method does not limit how the user equipment obtains the configuration of the demodulation reference signal sequence, and in fact the default first demodulation reference signal sequence and the second demodulation reference signal sequence can be specified in the system.
  • the advantage of indicating whether there is more data is that the base station can immediately release the uplink data transmission resource authorized in the blind authorization message when the user equipment knows that the user equipment has no more data, thereby improving resource utilization.
  • the blind authorization transmission configuration message or the first blind authorization message further includes the first demodulation reference signal sequence and/or the second demodulation reference signal sequence information.
  • the configuration information of the demodulation reference signal sequence may be carried in the blind authorization transmission configuration message, or may be carried in the first blind authorization message.
  • the configuration of the demodulation reference signal sequence only needs to be performed once, and does not need to carry the configuration information of the demodulation reference signal sequence in the blind authorization message every time, so the configuration of the demodulation reference signal sequence is carried in the blind authorization transmission configuration message. Information is the preferred solution.
  • the configuration information of the demodulation reference signal sequence may include two demodulation reference signal sequences at the same time, or may include only one, for example, the other has been included in other configuration information.
  • Different demodulation reference signal sequences can also be used to indicate whether a larger uplink data transmission resource is needed, so that when there is still a large amount of data to be transmitted, the existing resources are used to transmit data while requesting more resources from the base station, so as to be transmitted as soon as possible. The remaining large amount of data to be transmitted.
  • the blind authorization transmission configuration message or the first blind authorization message further includes the third demodulation reference signal sequence and/or the fourth demodulation reference signal sequence information. .
  • More different demodulation reference signal sequences can be used to indicate multiple meanings so that the base station knows whether resources authorized by the blind grant message can be released immediately to improve resource utilization efficiency and whether it is necessary to allocate more resources to the user equipment.
  • a large uplink data transmission resource so that the user equipment transmits the remaining large amount of data to be transmitted as soon as possible.
  • the blind authorization transmission configuration message or the first blind authorization message further includes the fifth demodulation reference signal sequence and/or the sixth demodulation reference signal sequence and / or the seventh demodulation reference signal sequence information.
  • first indication information where the first indication information is used to indicate whether there is more data to be transmitted, if no more The data indicates that the first indication information takes a first value, and if there is more data, the first indication information takes a second value.
  • the first indication information may only include 1 bit, and the value may be that the first value is “0”, the second value is “1”, or vice versa.
  • the method does not limit how to obtain the configuration of the first uplink control information transmission resource, for example, the first uplink control information transmission resource may be in an uplink control channel in the system, and the first uplink control information transmission resource The location in the uplink control channel may be obtained according to a location of the first uplink data transmission resource in a system resource.
  • the first uplink control information transmission resource may also be included in the first uplink data transmission resource, and its location in the first uplink data transmission resource is a default value.
  • the configuration of the first uplink control information transmission resource can be explicitly obtained.
  • the second indication information may only include 1 bit, and the value may be that the third value is “0”, the fourth value is “1”, or vice versa.
  • the method does not limit how to obtain the configuration of the second uplink control information transmission resource. For details, refer to the description in the method 8.
  • the configuration of the second uplink control information transmission resource can be explicitly obtained.
  • third indication information transmitting, by using the third uplink control information transmission resource, third indication information, where the third indication information is used to indicate whether there is more data to be transmitted and whether it needs to be larger.
  • the third indication information takes a fifth value if there is no more data, and the sixth indication value takes a sixth value if there is more data but no larger uplink data transmission resource is needed. If a larger uplink data transmission resource is required, the third indication information takes a seventh value.
  • the third indication information may only include 2 bits, and the value may be that the fifth value is “00”, the sixth value is “01”, the seventh value is “11”, or other uses. The combination of values.
  • the method does not limit how to configure the third uplink control information transmission resource. For details, refer to the description in method 8.
  • the configuration of the third uplink control information transmission resource can be explicitly obtained.
  • the second blind authorization message includes at least a second uplink data transmission resource indication information, where the second uplink data transmission resource is greater than the first uplink data transmission resource;
  • the fourth uplink data transmission resource in the fourth transmission period transmits the fourth data, or ends the transmission;
  • the third data is retransmitted in the second uplink data transmission resource in the fourth transmission period.
  • the indication method for indicating a larger uplink data transmission resource is not limited to using a demodulation reference information sequence or an uplink control information indication method.
  • the second uplink data transmission resource is greater than the first uplink data transmission resource, and specifically, the second uplink data transmission resource is twice the first uplink data transmission resource.
  • the second uplink data transmission resource may include the first uplink data transmission resource, and the second uplink data transmission resource indication information may be specific to the second uplink data transmission resource except the first uplink data. The incremental portion of the transmission resource.
  • the third data may include data that is not successfully transmitted when transmitted using the first uplink data transmission resource, such as the second data.
  • the method before the receiving the first blind authorization message sent by the base station, the method further includes:
  • the blind authorization transmission configuration message includes at least blind authorization scrambling code information, where the blind authorization scrambling code is used to receive the blind authorization scrambling code to receive the received by the blind authorization scrambling code
  • the message is the blind authorization message.
  • the blind authorization message is the first blind authorization message or the second blind authorization message.
  • a blind authorization transmission method for a base station comprising:
  • the first uplink data transmission resource in the second transmission period receives the second data transmitted by the user equipment;
  • the first uplink data transmission resource in the second transmission period re-receives the first data retransmitted by the user equipment.
  • the blind authorization transmission configuration message may be a configuration message of a radio resource control layer.
  • the blind authorization scrambling code may be a radio network temporary identifier, that is, a B-RNTI, which is allocated to the user equipment, and the B-RNTI is different from the C-RNTI and SPS- allocated by the base station to the user equipment in the existing specification.
  • a temporary identifier of the RNTI configured to indicate that the blind authorization message sent is a blind authorization message for authorization for blind authorization transmission.
  • the blind authorization message may be a blind authorization message in an existing specification, and the blind authorization scrambling code is used to scramble transmission.
  • the uplink data transmission resource authorized in the blind authorization message may continue to be reserved for the user equipment for a certain period of time if the transmission of the user equipment is detected on the transmission resource, and may continue for more than a certain period of time. After detecting the transmission of the user equipment on the transmission resource, the resource is released.
  • the first transmission period is not limited to a transmission period corresponding to when the transmission is detected on the first uplink data transmission resource for the first time after the first blind authorization message is sent to the user equipment.
  • the first data is not limited to the data carried by the transmission detected on the first uplink data transmission resource for the first time after the first blind authorization message is sent to the user equipment.
  • the demodulation reference signal sequence is a first demodulation reference signal sequence, indicating that the user equipment has no more data, releasing the first uplink data transmission resource after correctly receiving the first data
  • the demodulation reference signal sequence is a second demodulation reference signal sequence, indicating that the user equipment has more data
  • the first uplink data transmission resource is reserved after correctly receiving the first data.
  • the method does not define how to configure the demodulation reference signal sequence used by the user equipment.
  • the default first demodulation reference signal sequence and the second demodulation reference signal sequence can be specified in the system.
  • the benefit of the user equipment indicating whether there is more data when transmitting data is that the base station can immediately release the uplink data transmission resource authorized in the blind authorization message when the user equipment knows that the user equipment has no more data, thereby improving resource utilization.
  • blind authorization transmission configuration message or the first blind authorization message further includes the first demodulation reference signal sequence and/or the second demodulation reference signal sequence information .
  • blind authorization transmission configuration message or the first blind authorization message further includes the third demodulation reference signal sequence and/or the fourth demodulation reference signal sequence information.
  • the demodulation reference signal sequence is a fifth demodulation reference signal sequence, indicating that the user equipment has no more data, releasing the first uplink data transmission resource after correctly receiving the first data
  • the demodulation reference signal sequence is a sixth demodulation reference signal sequence, indicating that the user equipment has more data but does not need a larger uplink data transmission resource
  • the demodulation reference signal sequence is a seventh demodulation reference signal sequence If the user equipment needs a larger uplink data transmission resource, the user equipment is allocated a larger uplink data transmission resource.
  • blind authorization transmission configuration message or the first blind authorization message further includes the fifth demodulation reference signal sequence and/or the sixth demodulation reference signal sequence and / or the seventh demodulation reference signal sequence information.
  • the first indication information that is transmitted by the user equipment in the first uplink control information transmission resource, where the first indication information indicates the user Whether the device has more data to be transmitted, if the first indication information takes a first value, indicating that the user equipment has no more data, releasing the first uplink data transmission resource, if the first indication information Taking the second value, indicating that the user equipment has more data, the first uplink data transmission resource is reserved.
  • the first indication information may only include 1 bit, and the value may be that the first value is “0”, the second value is “1”, or vice versa.
  • the method does not limit how to configure the first uplink control information transmission resource, for example, the first uplink control information transmission resource may be in an uplink control channel in the system, and the first uplink control information transmission resource is in the uplink.
  • the location in the control channel can be calculated based on the location of the first uplink data transmission resource in the system resource.
  • the first uplink control information transmission resource may also be included in the first uplink data transmission resource, and its location in the first uplink data transmission resource is a default value.
  • the first uplink control information transmission resource can be explicitly configured.
  • Second indication information that is transmitted by the user equipment in the second uplink control information transmission resource, where the second indication information indicates the user, when receiving the data that is transmitted by the user equipment in the first uplink data transmission resource Whether the device needs a larger uplink data transmission resource, if the second indication information takes a third value, indicating that the user equipment does not need a larger uplink data transmission resource, and if the second indication information takes a fourth value, If the user equipment needs a larger uplink data transmission resource, the user equipment is allocated a larger uplink data transmission resource.
  • the second indication information may only include 1 bit, and the value may be that the third value is “0”, the fourth value is “1”, or vice versa.
  • the method does not limit how to configure the second uplink control information transmission resource. For details, refer to the description in method 23.
  • the second uplink control information transmission resource can be explicitly configured.
  • the third indication information that is transmitted by the user equipment in the third uplink control information transmission resource, where the third indication information indicates the user Whether the device has more data to be transmitted and whether a larger uplink data transmission resource is needed. If the third indication information takes a fifth value, indicating that the user equipment has no more data, the first uplink data transmission is released. a resource, if the third indication information takes a sixth value, indicating that the user equipment has more data but does not need a larger uplink data transmission resource, and if the third indication information takes a seventh value, indicating the user If the device needs a larger uplink data transmission resource, the user equipment is allocated a larger uplink data transmission resource.
  • the third indication information may only include 2 bits, and the value may be that the fifth value is “00”, the sixth value is “01”, the seventh value is “11”, or other uses. The combination of values.
  • the method does not limit how to configure the third uplink control information transmission resource. For details, refer to the description in method 23.
  • the third uplink control information transmission resource can be explicitly configured.
  • the second blind authorization message includes at least a second uplink data transmission resource indication information, where the second uplink data transmission resource is greater than the first uplink data transmission resource;
  • Receiving the third data in the fourth transmission period receiving the fourth data that is transmitted by the user equipment in the second uplink data transmission resource;
  • the third data that is retransmitted by the user equipment in the second uplink data transmission resource is received in a fourth transmission period.
  • the method for learning that the user equipment needs a larger uplink data transmission resource is not limited to obtaining a demodulation reference information sequence or receiving an uplink control information indication.
  • the second uplink data transmission resource is greater than the first uplink data transmission resource, and specifically, the second uplink data transmission resource is twice the first uplink data transmission resource.
  • the second uplink data transmission resource may include the first uplink data transmission resource, and the second uplink data transmission resource indication information may be specific to the second uplink data transmission resource except the first uplink data. The incremental portion of the transmission resource.
  • the third data may include data that is not successfully received when receiving the transmission of the user equipment on the first uplink data transmission resource, for example, the second data.
  • the method before the sending the first blind authorization message to the user equipment, the method further includes:
  • the blind authorization transmission configuration message includes at least blind authorization scrambling code information
  • the blind authorization scrambling code is used to send the blind authorization message to the user equipment.
  • the authorization scrambling code scrambles the sent blind authorization message, so that the user equipment identifies the received message as the blind authorization message by using the blind authorization scrambling code when receiving the blind authorization message sent by the base station.
  • the blind authorization message is the first blind authorization message or the second blind authorization message.
  • a blind authorization transmission method for user equipment comprising:
  • the user equipment transmits the first data to the base station without authorization
  • the first authorization message includes first resource indication information, and the first resource indication information Instructing the first transmission resource, where the first transmission resource is used at least for the user equipment to transmit a resource request message;
  • the user equipment sends a resource request message to the base station on the first transmission resource, where the resource request message includes resource requirement information, where the resource requirement information indicates a size or a transmission of the second data of the user equipment.
  • the size of the transmission resource required for the second data
  • the user equipment receives a second authorization message sent by the base station, where the second authorization message includes second resource indication information, the second resource indication information indicates a second transmission resource, and the second transmission resource is used for Transmitting, by the user equipment, the second data;
  • the user equipment sends the second data to the base station on the second transmission resource.
  • the resource request message may be a buffer status report BSR message in the prior art.
  • the length of the resource request message is fixed, so the base station can clearly know how much resources should be authorized to transmit the resource request message to the user equipment.
  • the first authorization message and the second authorization message may be the same type of authorization message, or may be different types of authorization messages.
  • the second data specifically includes the first data specifically, the second data is the first data, or the first data is a part of the second data. Any of the following references to one data containing another data has the same meaning as this, and will not be described again.
  • the request message specifically includes:
  • the amount of the first transmission resource is greater than the amount of the resource required to transmit the resource request message, and the user equipment and the base station pre-negotiate a blind authorization resource quantity, when the user equipment fails to transmit the authorization,
  • the amount of resources of the first transmission resource that is authorized by the base station to the user equipment is the amount of the blind authorization resource plus the amount of resources required to transmit a resource request message.
  • the base station determines, according to the situation that the user equipment is authorized to transmit the first data, the amount of the blind authorized resource, for example, according to the detected number of the unlicensed transmission resource unit used by the user equipment during the unauthorized transmission.
  • the amount of the blind authorization resource is determined. There may be other methods for determining the amount of blind grant resources, and the present invention does not limit how the base station determines the amount of blind grant resources.
  • the first authorization message further includes third resource indication information, where the third resource indication information indicates a third transmission resource, and the user equipment is in the first transmission resource
  • the method further includes:
  • the user equipment sends fourth data to the base station on the third transmission resource, where the fourth data is part or all of the first data, and the second data includes the first data, Or the second data does not include the fourth data but includes other portions of the second data other than the fourth data.
  • the resource request message and the fourth data are transmitted to the base station in a period.
  • the method of any one of the methods 31-34, wherein the first authorization message and the second authorization message are blind authorization messages, and the user equipment, before receiving the first authorization message sent by the base station, further includes:
  • the blind authorization transmission configuration message includes at least blind authorization scrambling code information, where the blind authorization transmission scrambling code is used by the user equipment to receive the blind authorization Message.
  • the blind authorization message is, for example, the first authorization message or the second authorization message.
  • a blind authorization transmission method used in a base station, the method comprising:
  • the base station sends a first authorization message to the user equipment, where the first authorization message indicates that the unauthorized transmission fails, the first authorization message includes first resource indication information, and the first resource indication information indicates a first transmission resource, where the first transmission resource is used at least for the user equipment to transmit a resource request message;
  • the resource request message sent by the user equipment, where the resource request message includes resource requirement information, where the resource requirement information indicates a size or a transmission of the second data of the user equipment The size of the transmission resource required for the second data;
  • the base station sends a second authorization message to the user equipment, where the second authorization message includes second resource indication information, the second resource indication information indicates a second transmission resource, and the second transmission resource is used by the Transmitting, by the user equipment, the second data;
  • the base station receives the second data sent by the user equipment on the second transmission resource.
  • the first authorization message and the second authorization message may be the same type of authorization message, or may be different types of authorization messages.
  • the request message specifically includes:
  • the amount of resources for the first transmission resource can be referred to the description in Method 33.
  • the first authorization message further includes third resource indication information, where the third resource indication information indicates a third transmission resource, and the base station receives the first transmission resource.
  • the resource request message sent by the user equipment also includes:
  • the base station further includes: before receiving the first data of the user equipment for unauthorized transmission;
  • the base station sends a blind authorization transmission configuration message to the user equipment, where the blind authorization transmission configuration message includes at least blind authorization scrambling code information, and the blind authorization transmission scrambling code is used to send the blind authorization to the user equipment. Message.
  • the blind authorization message is, for example, the first authorization message or the second authorization message.
  • a user equipment comprising:
  • a memory for storing instructions
  • a processor configured to invoke an instruction in the memory, to perform the method of any of the methods 1-15 and 31-35 above.
  • a base station comprising:
  • a memory for storing instructions
  • a user equipment comprising: a processor, a memory and a wireless transceiver;
  • the wireless transceiver is configured to receive and transmit data, and implement wireless communication with the base station;
  • the memory is for storing instructions
  • the processor is operative to execute the instructions in the memory and perform the method of any of methods 1-15 and 31-35.
  • a base station comprising: a processor, a memory and a wireless transceiver;
  • the wireless transceiver is configured to receive and transmit data, and implement wireless communication with the user equipment;
  • the memory is for storing instructions
  • the processor is operative to execute the instructions in the memory and perform the method of any of methods 16-30 and 36-40.
  • a user equipment configured to perform the method of any of methods 1-15 and 31-35.
  • a base station configured to perform the method of any of methods 16-30 and 36-40.
  • a computer program product comprising a computer program which, when executed on a computer, causes the computer to implement the method of any of methods 1-15 and 31-35.
  • a computer program product comprising a computer program which, when executed on a computer, causes the computer to implement the method of any of methods 16-30 and 36-40.
  • a computer program which, when executed on a computer, causes the computer to implement the method of any of methods 1-15 and 31-35.
  • a computer program which, when executed on a computer, causes the computer to implement the method of any of methods 16-30 and 36-40.
  • a computer readable storage medium having stored thereon a computer program, wherein the computer program, when executed on a computer, causes the computer to implement any of claims 1-15 and 31-35 Said method.
  • a computer readable storage medium having stored thereon a computer program, wherein the computer program, when executed on a computer, causes the computer to implement any of claims 16-30 and 36-40 Said method.
  • a communication system comprising the user equipment of any of methods 1-15 and 31-35 and the base station of any of methods 16-30 and 36-40.
  • a chip comprising: a processing module and a communication interface, the processing module being operative to perform the method of any of methods 1-15 and 31-35.
  • the chip according to method 54 the chip further comprising a storage module (eg, a memory), the storage module is configured to store an instruction, and the processing module is configured to execute the instruction stored by the storage module, and Execution of the instructions stored in the storage module causes the processing module to perform the method of any of methods 1-15 and 31-35.
  • a storage module eg, a memory
  • a chip comprising: a processing module and a communication interface, the processing module being operative to perform the method of any of methods 16-30 and 36-40.
  • the chip of method 56 the chip further comprising a storage module (eg, a memory), the storage module is configured to store an instruction, the processing module is configured to execute an instruction stored by the storage module, and Execution of the instructions stored in the storage module causes the processing module to perform the method of any of methods 16-30 and 36-40.
  • a storage module eg, a memory
  • the present application provides an apparatus (which may be a communication chip) in which instructions are stored that, when run on a device (such as a terminal device or a network device), cause the device to perform one of the above method embodiments.
  • a device such as a terminal device or a network device
  • the disclosed systems, devices, and methods may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the functions may be stored in a computer readable storage medium if implemented in the form of a software functional unit and sold or used as a standalone product.
  • the technical solution of the present application which is essential or contributes to the prior art, or a part of the technical solution, may be embodied in the form of a software product, which is stored in a storage medium, including
  • the instructions are used to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种传输方法、终端设备和网络设备,能够实现免授权传输失败后,快速转授权传输的目的。该方法包括:终端设备接收网络设备发送的第一授权消息,该第一授权消息是该网络设备在检测到该终端设备免授权传输第一数据失败后向该终端设备授权传输资源的消息,该第一授权消息包括资源指示信息,该资源指示信息用于指示第一传输资源,该第一传输资源用于该终端设备多次连续使用以传输该第一数据;该终端设备在该第一传输资源上向该网络设备发送第二数据,该第二数据为该第一数据的部分或全部。

Description

传输方法、终端设备和网络设备
本申请要求于2017年12月29日提交中国专利局、申请号为201711479657.0、申请名称为“传输方法、终端设备和网络设备”的中国专利申请的优先权,以及于2017年9月8日提交中国专利局、申请号为201710806575.6、申请名称为“一种盲授权传输方法及设备”的中国专利申请的优先权,以及于2017年8月24日提交中国专利局、申请号为201710737237.1、申请名称为“一种盲授权传输方法及设备”的中国专利申请的优先权,它们的全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,并且更具体地,涉及一种传输方法、终端设备和网络设备。
背景技术
第三代合作伙伴计划(the 3rd Generation Partnership Project,3GPP)制定的第四代无线通信技术规范中,为了提高无线资源利用率和系统容量,不为每个终端设备长期配置专用的上行传输资源,而是仅当终端设备有数据传输需求时,才给终端设备分配所需要的传输资源。分配资源的过程称为授权过程,基于这种授权过程的传输称为授权传输。
目前正在制定的第五代(the 5 th Generation,5G)无线通信标准中,为了支持高可靠低时延(Ultra-Reliability Low Latency Communication,URLLC)业务,提出使用免授权(Grant free)传输技术。即,网络设备预先安排一个共享的基于冲突的传输区(Contention-based Transmission Area,CTA),该CTA在每个免授权传输周期都出现,终端设备在有数据发送时,立即在最近一个免授权传输周期的CTA中随机选择一个或多个基于冲突的传输单元(Contention-based Transmission Unit,CTU)传输数据。因为终端设备在传输数据前没有请求网络设备分配资源,因此这种传输技术可称为免授权传输。
由于免授权传输是基于竞争的,如果多个终端设备选择了相同的CTU传输数据,就会造成冲突使传输失败。为提高传输成功率,终端设备可以使用K-重复传输技术,即在连续K个免授权传输周期中都传输相同的数据,其中K≥2,且K为整数。然而,即使连续传输K次,也不能保证成功传输。因此,网络设备在确定终端设备正在进行免授权传输但还不能正确接收该终端设备的数据时,或者,在终端设备进行K次免授权传输后而网络设备还不能正确接收该终端设备的数据时,网络设备需要及时向该终端设备授权传输资源使其可靠地重传需要传输的数据,这个过程称为免授权传输转授权传输,简称免授权转授权(Grant free to Grant-based,GF2GB)。
然而,当前技术中还未涉及免授权传输失败后,如何进行授权传输的方案。因此,如何实现免授权传输失败后的授权传输,成为一个亟需解决的问题。
发明内容
本申请提供一种传输方法、终端设备和网络设备,能够实现免授权传输失败后,快速转授权传输的目的。
第一方面,提供了一种传输方法,该方法包括:终端设备接收网络设备发送的第一授权消息,所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端 设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
所述终端设备在所述第一传输资源上向所述网络设备发送第二数据,所述第二数据为所述第一数据的部分或全部。
所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据,可以理解为,第一传输资源为周期性的资源,若第一传输资源的大小能够传输完第一数据的全部,则在第一传输资源上传输第一数据的全部,若第一传输资源的大小只能够传输完第一数据的一部分,则在第一传输资源上传输第一数据的一部分,然后在下一传输周期继续使用该第一传输资源传输第一数据中剩余的部分。或者,若第一数据的全部或一部分传输失败,终端设备可以在下一传输周期继续使用该第一传输资源重传第一数据的全部或一部分。
此外,第一传输资源还可以用于传输不同于第一数据的其他数据,本申请实施例对此不作限定。
本申请实施例的传输方法,在终端设备免授权传输失败后,网络设备可以立即通过第一授权消息向终端设备授权传输资源,使得终端设备可以多次利用该传输资源传输免授权传输失败的数据,实现了免授权传输失败后,快速转授权传输的目的。并且,由于不需要使用免授权传输方式传输数据,能够达到快速传输数据的目的,从而能够减小传输时延。
在一种可能的实现方式中,所述终端设备多次连续使用所述第一传输资源,包括:
在所述终端设备在发送所述第二数据之后的预定时间内未接收到所述网络设备发送的肯定应答(Acknowledgement,ACK)的情况下,或,在所述终端设备在发送所述第二数据之后的预定时间内接收到所述网络设备发送的否定应答(Negative Acknowledgment,NACK)的情况下,所述终端设备在所述第一传输资源上重传所述第二数据。
在一种可能的实现方式中,所述终端设备多次连续使用所述第一传输资源,包括:
在所述第二数据为所述第一数据的部分的情况下,若所述终端设备在发送所述第二数据之后的预定时间内接收到所述网络设备发送的肯定应答ACK,则所述终端设备在所述第一传输资源上向所述网络设备发送第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
在一种可能的实现方式中,所述方法还包括:
所述终端设备在发送所述第二数据时发送第一指示信息,所述第一指示信息用于指示所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
例如,第二数据和第一指示信息可以通过第一数据帧携带,终端设备发送第一数据帧也就发送了第二数据和第一指示信息。本申请实施例的方法,终端设备通过第一指示信息向网络设备指示该终端设备是否还有第二数据之外的其他数据需要使用第一传输资源传输,使得在终端设备没有第二数据之外的其他数据需要使用第一传输资源传输时,网络设备可以及时释放所授权资源,避免资源浪费。
可选地,所述第一指示信息为在所述第一传输资源中的解调参考信号(Demodulation Reference Signal,DMRS)资源上发送的DMRS序列;
其中,若所述第一指示信息为第一DMRS序列,指示所述终端设备在传输完所述第二数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
若所述第一指示信息为第二DMRS序列,指示所述终端设备在传输完所述第二数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
在一种可能的实现方式中,所述方法还包括:
所述终端设备在发送所述第二数据时发送第二指示信息,所述第二指示信息用于指示所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
例如,第二数据和第二指示信息可以通过第二数据帧携带,终端设备发送第二数据帧也就发送了第二数据和第二指示信息。
应理解,第一数据帧和第二数据帧也可以为同一数据帧,该数据帧可以携带第二数据、第一指示信息和第二指示信息。
还应理解,该其他传输资源可以是大小大于第一传输资源的一块传输资源,但在该其他传输资源生效的同时第一传输资源被释放。或者,该其他传输资源可以是大小不限的一块传输资源,终端设备可以同时使用该其他传输资源和第一传输资源。终端设备若通过第二指示信息指示其需要不同于所述第一传输资源的其他传输资源,表示终端设备需要更多的传输资源。
在该实施例中,终端设备通过第二指示信息向网络设备指示该终端设备是否还需要更多的传输资源,使得在盲授权(Blind-grant)资源远小于终端设备待传输数据所需资源时,终端设备可以在传输部分数据的同时获取更大资源,从而能够减少用于请求传输资源的的信令交互,降低传输时延。
进一步地,若所述第二指示信息指示所述终端设备需要不同于所述第一传输资源的其他传输资源,在所述终端设备在所述第一传输资源上向所述网络设备发送第二数据之后,所述方法还包括:
所述终端设备接收所述网络设备发送的第二授权消息,所述第二授权消息用于指示第二传输资源;
所述终端设备根据所述第二授权消息,使用所述第二传输资源向所述网络设备发送第四数据,所述第四数据包括所述第一数据的部分或全部。
本申请实施例的方法,终端设备通过第二指示信息向网络设备指示该终端设备是否还需要不同于第一传输资源的其他传输资源,使得在盲授权资源远小于终端设备待传输数据所需资源时,终端设备可以在传输部分数据的同时获取更大资源,从而能够减少用于请求传输资源的的信令交互,降低传输时延。
可选地,所述第二指示信息为在所述第一传输资源中的DMRS资源上发送的DMRS序列;
其中,若所述第二指示信息为第三DMRS序列,指示所述终端设备不需要不同于所述第一传输资源的其他传输资源;
若所述第二指示信息为第四DMRS序列,指示所述终端设备需要不同于所述第一传输资源的其他传输资源。
在一种可能的实现方式中,所述第一授权消息中的循环冗余校验码(Cyclic Redundancy Check,CRC)采用第一标识加扰;
其中,所述终端设备接收网络设备发送的第一授权消息,包括:
所述终端设备采用所述第一标识对所述网络设备发送的至少一个下行消息的CRC进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
在一种可能的实现方式中,所述第一授权消息还包括第三指示信息,所述第三指示信息用于指示所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
在一种可能的实现方式中,在所述终端设备接收网络设备发送的第一授权消息之前,所述方法还包括:
所述终端设备接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
可选地,该传输配置消息可以是无线资源控制(Radio Resource Control,RRC)消息、媒体接入控制控制单元(Media Access Control Control Element,MAC CE)等,本申请实施例对此不作限定。
第二方面,提供了一种传输方法,包括:网络设备向终端设备发送第一授权消息,所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
所述网络设备在所述第一传输资源上检测所述终端设备发送的第二数据,所述第二数据为所述第一数据的部分或全部。
所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据,可以理解为,第一传输资源为周期性的资源,若第一传输资源的大小能够传输完第一数据的全部,则在第一传输资源上传输第一数据的全部,若第一传输资源的大小只能够传输完第一数据的一部分,则在第一传输资源上传输第一数据的一部分,然后在下一传输周期继续使用该第一传输资源传输第一数据中剩余的部分。或者,若第一数据的全部或一部分传输失败,终端设备可以在下一传输周期继续使用该第一传输资源重传第一数据的全部或一部分。
此外,第一传输资源还可以用于传输不同于第一数据的其他数据,本申请实施例对此不作限定。
本申请实施例的传输方法,在终端设备免授权传输失败后,网络设备可以立即通过第一授权消息向终端设备授权传输资源,使得终端设备可以多次利用该传输资源传输免授权传输失败的数据,实现了免授权传输失败后,快速转授权传输的目的。并且,由于不需要使用免授权传输方式传输数据,能够达到快速传输数据的目的,从而能够减小传输时延。
在一种可能的实现方式中,所述方法还包括:
若所述网络设备未正确接收所述终端设备发送的所述第二数据,所述网络设备向所述终端设备发送否定应答NACK;
所述网络设备在所述第一传输资源上接收所述终端设备重传的所述第二数据。
在一种可能的实现方式中,所述第二数据为所述第一数据的部分;
所述方法还包括:
若所述网络设备正确接收所述终端设备发送的所述第二数据,所述网络设备向所述终端设备发送肯定应答ACK;
所述网络设备在所述第一传输资源上检测所述终端设备发送的第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
在一种可能的实现方式中,所述方法还包括:
所述网络设备在检测所述第二数据时检测所述终端设备发送的第一指示信息;
所述网络设备根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
应理解,第二数据和第一指示信息可以通过第一数据帧携带,那么,网络设备在检测所述第二数据时检测所述终端设备发送的第一指示信息,可以是网络设备检测第一数据帧所携带的第一指示信息。但本申请并不限定第二数据和第一指示信息是否通过同一数据帧携带。
本申请实施例的方法,终端设备通过第一指示信息向网络设备指示该终端设备是否还有第二数据之外的其他数据需要使用第一传输资源传输,使得在终端设备没有第二数据之外的其他数据需要使用第一传输资源传输时,网络设备可以及时释放所授权资源,避免资源浪费。
在一种可能的实现方式中,所述第一指示信息为在所述第一传输资源中的DMRS资源上发送的DMRS序列;
其中,所述网络设备根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输,包括:
若所述网络设备在所述第一传输资源上检测到第一DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
若所述网络设备在所述第一传输资源上检测到第二DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
在一种可能的实现方式中,所述方法还包括:
所述网络设备在检测所述第二数据时检测所述终端设备发送的第二指示信息;
所述网络设备根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
应理解,第二数据和第二指示信息可以通过第二数据帧携带,那么,网络设备在检测所述第二数据时检测所述终端设备发送的第二指示信息,可以是网络设备检测第二数据帧所携带的第二指示信息。但本申请并不限定第二数据和第二指示信息是否通过同一数据帧携带。
进一步地,若所述网络设备确定所述终端设备需要不同于所述第一传输资源的其他传输资源,所述方法还包括:
所述网络设备向所述终端设备发送第二授权消息,所述第二授权消息用于指示第二传输资源;
所述网络设备在所述第二传输资源上检测所述终端设备发送的第四数据。
本申请实施例的方法,终端设备通过第二指示信息向网络设备指示该终端设备是否还需要不同于第一传输资源的其他传输资源,使得在盲授权资源远小于终端设备待传输数据所需资源时,终端设备可以在传输部分数据的同时获取更大资源,从而能够减少用于请求传输资源的的信令交互,降低传输时延。
可选地,所述第二指示信息为在所述第一传输资源中的DMRS资源上发送的DMRS序列;
其中,所述网络设备根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源,包括:
若所述网络设备在所述第一传输资源上检测到第三DMRS序列,所述网络设备确定所述终端设备不需要不同于所述第一传输资源的其他传输资源;
若所述网络设备在所述第一传输资源上检测到第四DMRS序列,所述网络设备确定所述终端设备需要不同于所述第一传输资源的其他传输资源。
在一种可能的实现方式中,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
在一种可能的实现方式中,所述第一授权消息还包括第三指示信息,所述第三指示信息用于指示所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
在一种可能的实现方式中,在网络设备向终端设备发送第一授权消息之前,所述方法还包括:
所述网络设备向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
第三方面,提供了一种传输方法,包括:终端设备接收网络设备发送的第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
所述终端设备在所述第一传输资源上向所述网络设备发送资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
所述终端设备接收所述网络设备发送的第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
所述终端设备在所述第二传输资源上向所述网络设备发送所述第二数据。
本申请实施例的传输方法,在免授权传输失败后,网络设备通过第一授权消息向终端设备授权用于传输资源请求消息的资源,终端设备根据第一授权消息中向网络设备发送资源请求消息,网络设备根据该资源请求消息可以在第二授权消息中为终端设备分配足够的资源,使得终端设备可以一次性传输完还需要传输的全部数据,实现了免授权传输失败后,快速转授权传输的目的。并且,本申请实施例的方法,能够减小传输时延。
另外,相对于现有技术中,虽然终端设备也发送了资源请求消息,但由于本申请实施例的方法中,终端设备没有发送资源请求消息就可以获得传输资源请求消息的资源,因此能够减少信令开销,降低传输延迟。
在一种可能的实现方式中,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
其中,所述终端设备在所述第一传输资源上向所述网络设备发送资源请求消息,包括:
所述终端设备在所述第一传输资源上向所述网络设备发送第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
在一种可能的实现方式中,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
其中,在所述终端设备接收所述网络设备发送的第二授权消息之前,所述方法还包括:
所述终端设备在所述第三传输资源上发送第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
在一种可能的实现方式中,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述终端设备接收所述网络设备发送的第一授权消息,包括:
所述终端设备采用所述第一标识对所述网络设备发送的至少一个下行消息进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
在一种可能的实现方式中,在所述终端设备接收所述网络设备发送的第一授权消息之前,所述方法还包括:
所述终端设备接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
可选地,该传输配置消息可以是RRC消息、MAC CE等,本申请实施例对此不作限定。
第四方面,提供了一种传输方法,包括:网络设备向终端设备发送第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
所述网络设备接收所述终端设备在所述第一传输资源上发送的资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
所述网络设备向所述终端设备发送第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
所述网络设备接收所述终端设备在所述第二传输资源上发送的所述第二数据。
本申请实施例的传输方法,在免授权传输失败后,网络设备通过第一授权消息向终端设备授权用于传输资源请求消息的资源,终端设备根据第一授权消息中向网络设备发送资源请求消息,网络设备根据该资源请求消息可以在第二授权消息中为终端设备分配足够的资源,使得终端设备可以一次性传输完还需要传输的全部数据,实现了免授权传输失败后,快速授权传输的目的。并且,本申请实施例的方法,能够减小传输时延。
另外,相对于现有技术中,虽然终端设备也发送了资源请求消息,但由于本申请实施例的方法中,终端设备没有发送资源请求消息就可以获得传输资源请求消息的资源,因此能够减少信令开销,降低传输延迟。
在一种可能的实现方式中,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
其中,所述网络设备接收所述终端设备在所述第一传输资源上发送的资源请求消息,包括:
所述网络设备接收所述终端设备在所述第一传输资源上发送的第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
在一种可能的实现方式中,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
其中,在所述网络设备向所述终端设备发送第二授权消息之前,所述方法还包括:
所述网络设备接收所述终端设备在所述第三传输资源上发送的第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
在一种可能的实现方式中,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
在一种可能的实现方式中,在所述网络设备向终端设备发送第一授权消息之前,所述方法还包括:
所述网络设备向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
第五方面,提供了一种终端设备,用于执行上述第一方面或第一方面的任意可能的实现方式中的方法,或者用于执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第六方面,本申请提供了一种网络设备,用于执行上述第二方面或第二方面的任意可能的实现方式中的方法,或者用于执行上述第四方面或第四方面的任意可能的实现方式中的方法。
第七方面,本申请提供了一种终端设备,该终端设备包括:存储器、处理器和收发器,该存储器上存储可在该处理器上运行的计算机程序,该处理器执行该计算机程序时执行上述第一方面或第一方面的任意可能的实现方式中的方法,或者执行上述第三方面或第三方面的任意可能的实现方式中的方法。
第八方面,本申请提供了一种网络设备,该网络设备包括:存储器、处理器和收发器,该存储器上存储可在该处理器上运行的计算机程序,该处理器执行该计算机程序时执行上述第二方面或第二方面的任意可能的实现方式中的方法,或者执行上述第四方面或第四方面的任意可能的实现方式中的方法。
第九方面,本申请提供了一种计算机可读介质,用于存储计算机程序,该计算机程序包括用于执行上述各方面或上述各方面的任意可能的实现方式中的方法的指令。
第十方面,本申请提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述各方面或上述各方面的任意可能的实现方式中的方法。
第十一方面,本申请提供了一种芯片,包括:输入接口、输出接口、至少一个处理器、存储器,所述输入接口、输出接口、所述处理器以及所述存储器之间通过内部连接通路互相通信,所述处理器用于执行所述存储器中的代码,当所述代码被执行时,所述处理器用于执行上述各方面或上述各方面的任意可能的实现方式中的方法。
附图说明
图1是本申请实施例提供的系统的示意性架构图;
图2是RA机制的接入过程示意图;
图3是SR机制的接入过程示意图;
图4是SPS机制的接入过程的示意图;
图5是本申请一个实施例的传输方法的示意性流程图;
图6是本申请一个具体实施例的传输方法的示意性流程图;
图7是本申请另一实施例的传输方法的示意性流程图;
图8是本申请一个具体实施例的传输方法的示意性流程图;
图9是本申请实施例提供的终端设备的示意性框图;
图10是本申请实施例提供的网络设备的示意性框图;
图11是本申请另一实施例提供的终端设备的示意性框图;
图12是本申请另一实施例提供的网络设备的示意性框图;
图13是本申请实施例提供的另一终端设备的示意性框图;
图14是本申请实施例提供的另一网络设备的示意性框图。
具体实施方式
下面将结合附图,对本申请中的技术方案进行描述。
应理解,本申请实施例中的方式、情况、类别以及实施例的划分仅是为了描述的方便,不应构成特别的限定,各种方式、类别、情况以及实施例中的特征在不矛盾的情况下可以相结合。
还应理解,申请实施例中的“第一”和“第二”仅为了区分,不应对本申请构成任何限定。
还应理解,在本申请的各种实施例中,各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
还应理解,在本申请的各种实施例中,各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
本申请实施例的技术方案可以应用于各种通信系统,例如:全球移动通讯(Global System of Mobile communication,GSM)系统、码分多址(Code Division Multiple Access,CDMA)系统、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统、通用分组无线业务(General Packet Radio Service,GPRS)、长期演进(Long Term Evolution,LTE)系统、LTE频分双工(Frequency Division Duplex,FDD)系统、LTE时分双工(Time Division Duplex,TDD)、通用移动通信系统(Universal Mobile Telecommunication System,UMTS)、全球互联微波接入(Worldwide Interoperability for Microwave Access,WiMAX)通信系统、第五代(5th Generation,5G)通信系统或新无线(New Radio,NR)等。
本申请实施例中的终端设备可以指用户设备(User Equipment,UE)、接入终端、用户单元、用户站、移动站、移动台、远方站、远程终端、移动设备、用户终端、终端、无线通信设备、用户代理或用户装置。终端设备还可以是蜂窝电话、无绳电话、会话启动协议(Session Initiation Protocol,SIP)电话、无线本地环路(Wireless Local Loop,WLL)站、个人数字处理(Personal Digital Assistant,PDA)、具有无线通信功能的手持设备、计算设备或连接到无线调制解调器的其它处理设备、车载设备、可穿戴设备,未来5G网络中的终端设备或者未来演进的公用陆地移动通信网络(Public Land Mobile Network,PLMN)中的终端设备等,本申请实施例对此并不限定。
本申请实施例中的网络设备可以是用于与终端设备通信的设备,该网络设备可以是全球移动通讯(Global System of Mobile communication,GSM)系统或码分多址(Code Division Multiple Access,CDMA)中的基站(Base Transceiver Station,BTS),也可以是宽带码分多址(Wideband Code Division Multiple Access,WCDMA)系统中的基站(NodeB,NB),还可以是LTE系统中的演进型基站(Evolutional NodeB,eNB或eNodeB),还可以是云无线接入网络(Cloud Radio Access Network,CRAN)场景下的无线控制器,或者该网络设备可以为中继站、接入点、车载设备、可穿戴设备以及5G网络中的网络设备或者未来演进的PLMN网络中的网络设备等,本申请实施例并不限定。
图1为适用于本申请实施例的系统100的示意图。如图1所示,该系统100包括网络设备101,该系统100还包括位于网络设备101覆盖范围之内的终端设备102以及终端设备103。网络设备101可以与终端设备102和终端设备103进行通信。应理解,图1中仅以网络设备101覆盖范围 内的两个终端设备作为示例。显然,网络设备101的覆盖范围内也可以有更多的终端设备。
终端设备102或终端设备103向网络设备101的传输,称为上行传输。现有LTE规范中定义的上行传输机制包括随机接入(Random Access,RA)机制、调度请求(Scheduling Request,SR)机制、半永久调度(Semi-Persistent Scheduling,SPS)机制。
图2示出了RA机制的接入过程示意图。下面结合图2,对RA机制的接入过程进行介绍。需要说明的是,在下文的描述中,作为动词的“传输”和“发送”可以相互替换。
S202,终端设备向网络设备发送RA请求消息。
当终端设备有数据要向网络设备发送时,如果没有预配置任何专用资源,就在公共的随机接入资源中发送RA请求消息。RA请求消息是一个很简单的信号,仅包含一个随机的前导序列,表示有终端设备要发送数据,而没有信息指示是哪个终端设备要发送数据。
S204,网络设备向终端设备发送上行授权消息#1。
网络设备检测到这样的前导码序列即RA请求消息后,就向终端设备发送上行授权消息#1。上行授权消息#1仅授权一个很小的一次性使用的传输资源,用于终端设备传输缓存状态报告(Buffer Status Report,BSR)消息。
S206,终端设备向网络设备发送BSR消息。
终端设备接收到上行授权消息#1后,在上行授权消息#1授权的初始上行数据传输资源中发送BSR消息,在BSR消息中指示自己要发送的数据量。
S208,网络设备向终端设备发送上行授权消息#2。
由于可能在S202中多个终端设备发送了相同的前导序列,即相同的RA信号,因此这多个终端设备都会认为S204中初始上行授权的传输资源是给自己的,就会导致在S206中多个终端设备在相同的传输资源上传输BSR消息,就会产生冲突,导致网络设备不能接收缓存状态报告,网络设备也就不会执行S208,以进一步授权。
若S206中的缓存状态报告没有发生冲突,网络设备根据终端设备要发送的数据量和终端设备可使用的传输速率确定应该给终端设备分配的数据传输资源,在S208中发送上行授权消息#2,将分配的数据传输资源发送给终端设备。其中,上行授权消息#2使用终端设备的小区无线网络临时标识(Cell Radio Network Temporary Identifier,C-RNTI)加扰。
S210,终端设备向网络设备发送数据。
终端设备使用C-RNTI收到上行授权消息#2后,在授权的数据传输资源上发送数据。
S212,网络设备向终端设备发送ACK。
若网络设备正确接收到终端设备发送的数据,回送指示正确接收的ACK信号之后就释放(或回收)所分配的数据传输资源。
若网络设备没有正确接收到终端设备发送的数据,在向终端设备发送指示未正确接收的NACK信号之后尝试接收终端设备在所分配的数据传输资源上重新传输的数据。传输和接收数据的具体过程这里不作详细介绍。
图3示出了SR机制的接入过程示意图。下面结合图3,对SR机制的接入过程进行介绍。
S302,终端设备向网络设备发送SR消息。
终端设备有传输数据的需求时,在专用资源,即SR资源上向网络设备发送SR消息。
S304,网络设备向终端设备发送上行授权消息#3。
网络设备检测到SR消息后,就向终端设备发送上行授权消息#3。上行授权消息#3仅授权一 个很小的一次性使用的传输资源,用于终端设备传输BSR消息。
S306,终端设备向网络设备发送BSR消息。
S308,网络设备向终端设备发送上行授权消息#4。
网络设备根据终端设备要发送的数据量和终端设备可使用的传输速率确定应该给终端设备分配的数据传输资源,在S308中发送上行授权消息#4,将分配的数据传输资源发送给终端设备。
S310,终端设备向网络设备发送数据。
S312,网络设备向终端设备发送ACK。
若网络设备正确接收到终端设备发送的数据,回送指示正确接收的ACK信号之后就释放所分配的数据传输资源。
若网络设备没有正确接收到终端设备发送的数据,在向终端设备发送指示未正确接收的NACK信号之后尝试接收终端设备在所分配的数据传输资源上重新传输的数据。传输和接收数据的具体过程这里不作详细介绍。
可以看出,SR机制的接入过程与RA机制的接入过程非常相似,不同点主要在于,在S202中,RA请求使用的是公共的随机接入资源,而在S302中,SR消息使用的是终端设备专用资源,因此SR接入过程不存在冲突。实际上,终端设备在进行RA机制的接入过程中,可能在S208中获得传输数据的传输资源的同时,还获得一个后续用于发送SR消息的专用资源,即SR资源,SR资源周期性出现。如果终端设备拥有一个SR资源,在需要进行上行传输时,就在SR资源上发送SR消息,执行SR接入过程而不是RA接入过程。SR消息也是一个很简单的信号,但是因为传输资源是终端设备专用的,因此网络设备在这个专用资源上收到SR消息,就知道是哪个终端设备有传输需求,S304的上行授权消息#3授权的用于终端设备传输RSR消息的资源就是终端设备专用的,不会发生冲突。
图4示出了SPS机制的接入过程的示意图。下面结合图4,对SPS机制的接入过程进行介绍。
S402,建立语音业务。
SPS机制针对语音业务而设计。语音业务的特点是终端设备周期性发送数据并且周期性接收数据,如果每次传输都临时分配资源则信令开销太大也不及时,因此需要一次配置传输资源后重复使用。
网络设备和终端设备之间如何建立语音业务这里不作详细介绍,它可以是终端设备自己触发也可能是网络侧触发,具体可以参见现有技术。
S404,网络设备向终端设备发送SPS配置消息。
语音业务的建立触发网络设备向终端设备发送RRC层的配置消息,即SPS配置消息。RRC层是终端设备和网络设备之间的无线资源控制层,相当于协议栈的二层或者说MAC层。网络设备通过SPS配置消息向终端设备配置SPS-RNTI、传输周期、隐式释放空周期数Q等等。其中SPS-RNTI是一个针对终端设备的半永久调度的RNTI。一个终端设备可以有多个用于不同用途的RNTI,上述关于RA机制的描述中提到的C-RNTI是终端设备常用的一种RNTI。传输周期是终端设备传输上行数据和接收下行数据的周期,语音业务通常每10毫秒或20毫秒传输和接收一个数据。隐式释放空周期数Q的含义是,如果网络设备在连续Q个周期内都没有接收到终端设备的上行数据,则释放分配给终端设备的传输资源,即网络设备认为语音会话结束。C的取值可以是6、10等。
S406,网络设备向终端设备发送SPS授权消息。
终端设备获得RRC层的SPS配置后,并不能马上进行数据传输,因为传输数据的传输资源尚未获得。网络设备使用SPS授权消息来授权SPS资源。SPS资源包括终端设备传输上行数据的传输资源、接收下行数据的传输资源,还包括其它信息以指示该SPS被激活等等,这里不作详细描述。
SPS授权消息的内容中并不包含终端设备的标识信息,而是使用终端设备的相关RNTI进行加扰,终端设备在接收SPS授权消息时需要用自己的各种RNTI解扰以接收SPS授权消息。如果终端设备使用自己的SPS-RNTI成功接收一个上行授权消息,则这个上行授权消息就是给这个终端设备的SPS授权消息。而RA和SR机制的上行授权消息使用终端设备的C-RNTI加扰。C-RNTI和SPS-RNTI都是终端设备的临时标识,但用途不同。
S408,终端设备向网络设备发送上行数据。
在终端设备收到SPS授权消息且其中的信息指示激活SPS资源后,终端设备就可以周期性地使用授权的资源与网络设备进行通信。例如,终端设备在有上行数据需要传输时,可以在使用终端设备传输上行数据的传输资源向网络设备发送上行数据。
S410,网络设备向终端设备发送ACK。
若网络设备正确接收到终端设备发送的数据,回送指示正确接收的ACK信号。
S412,网络设备向终端设备发送下行数据。
在终端设备收到SPS授权消息且其中的信息指示激活SPS资源后,终端设备就可以周期性地使用授权的资源与网络设备进行通信。例如,网络设备在有下行数据需要传输时,可以在使用接收下行数据的传输资源向终端设备发送下行数据。
S414,终端设备向网络设备发送ACK。
若终端设备正确接收到网络设备发送的数据,回送指示正确接收的ACK信号。
需要注意的是,由于终端设备会周期性的产生新数据,因此如果终端设备传输一个数据失败,是不能在下一个周期的SPS资源上重传传输失败的数据的,而是由网络设备另行分配临时资源用于重传传输失败的数据。
S416,网络设备向终端设备发送去激活指示信息。
网络设备接收到终端设备发送的ACK后,可以向终端设备发送一个去激活指示信息,指示去激活SPS资源,实现释放SPS资源的目的。网络设备也可以在连续Q个周期都没有收到终端设备的上行数据后释放SPS资源。
5G无线通信标准中,为了支持URLLC业务,提出使用免授权(Grant free)传输技术。即,网络设备预先安排一个共享的CTA,该CTA在每个免授权传输周期都出现,终端设备在有数据发送时,立即在最近一个免授权传输周期的CTA中随机选择一个或多个CTU传输数据。因为终端设备在传输数据前没有请求网络设备分配资源,因此这种传输技术称为免授权传输。
以终端设备102传输数据为例,终端设备102可以采用免授权传输技术向网络设备101传输数据。即,终端设备102在有数据发送时,立即在最近一个免授权传输周期的CTA中随机选择一个或多个CTU传输数据。如果终端设备102免授权传输失败,例如终端设备连续传输K次该数据后都失败,或者,终端设备102在还没有传输K次但每次传输都失败且网络设备101不想等待后续的免授权传输,网络设备就要向该终端设备授权传输资源使其可靠地重传需要传输的数据,这个过程称为免授权传输转授权传输GF2GB。
另外,在免授权传输中,终端设备可以随机选择资源传输,网络设备不能通过资源位置来识 别传输来自哪个终端设备。目前的解决办法是通过DMRS序列识别终端设备。具体来讲,终端设备在传输时,为了使网络设备能正确解调,在传输资源单元的一些固定位置(即,DMRS传输资源)上传输DMRS序列。网络设备根据这些固定位置上的DMRS去解调其它位置上的信号。不同的终端设备如果传输不同的DMRS序列有所不同,网络设备就可以通过DMRS序列来识别数据是哪个终端设备发送的。而且,如果不同的终端设备使用的DMRS序列正交,则在多个终端设备选择同一个CTU传输数据时,虽然多个终端设备传输的数据重叠后相互干扰而使网络设备无法接收,但它们的DMRS序列仍可以被网络设备正确识别。如此,网络设备在接收免授权传输的数据时,就可以知道哪些终端设备在传输数据,在不能正确接收免授权传输的数据时,可以正确地向终端设备发起GF2GB。
然而,当前技术中还未涉及免授权传输失败后,如何快速地进行授权传输的方案。基于此,本申请提供了一种传输方法,网络设备通过在终端设备免授权传输失败后,向终端设备授权传输资源,使终端设备能够通过授权的传输资源传输数据。
以下,结合图5对本申请实施例的传输方法进行详细说明。图5是根据本申请实施例的传输方法的一例的示意性交互图。应理解,图5示出了方法500的详细的步骤或操作,但这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或仅执行图5中部分操作。
该方法500可以由网络设备和终端设备执行。其中,网络设备可以是上述系统100中的网络设备101,终端设备可以是上述系统100中的终端设备102或终端设备103。
S502,网络设备向终端设备发送盲授权消息#1(即,第一授权消息的一例)。
具体地,在终端设备免授权传输失败后,网络设备可以向终端设备授权用于传输上行数据的传输资源。比如,网络设备可以通过检测CTU上的DMRS序列获知该终端设备在进行免授权传输,但在首次或多次未能成功接收终端设备传输的数据时,网络设备认为该终端设备免授权传输失败,启动GF2GB过程,向终端设备授权传输资源。
本申请实施例中,可以将网络设备在检测到终端设备发生免授权传输失败后,为所述终端设备授权传输资源时所发送的消息记作:盲授权消息。相应地,通过盲授权消息所授权的传输资源记作:盲授权资源。
盲授权消息不同于现有技术中的上行授权消息,例如不同于RA机制接入技术中的上行授权消息#2、SR机制接入过程中的上行授权消息#4,以及SPS机制接入技术中的SPS授权消息。
盲授权消息是终端设备免授权传输失败后触发的,而RA机制和SR机制接入技术中的授权消息是在终端设备发送调度请求或缓存报告后发送的,SPS机制接入技术中的授权资源是终端设备和网络设备建立语音业务后网络设备发送的,与免授权传输没有关系。
盲授权资源也与现有技术中通过上行授权消息授权的资源(即,授权资源)不同。
RA机制和SR机制接入技术中,授权资源的大小是网络设备根据终端设备所上报的需求,例如需要传输的数据大小所确定的。一般来说,授权资源的大小等于或者稍大于终端设备需要传输的数据大小。而通过盲授权消息授权的资源(即,盲授权资源)的大小是网络设备在不知道终端设备需要传输的数据大小的情况下自主决定的。比如,网络设备可以根据预设值,或与终端设备事先协商的值,或根据在CTA中检测到的终端设备占用的CTU数量等方法确定盲授权资源的大小。本申请实施例并不对网络设备如何确定盲授权资源的大小进行具体限定。容易理解,盲授权资源不在任何一个CTA中。
此外,盲授权资源可用于该终端设备多次连续使用,以传输之前免授权传输失败的第一数据。 具体来讲,若盲授权资源的大小能够传输完第一数据的全部,则在盲授权资源上传输第一数据的全部,若盲授权资源的大小只能够传输完第一数据的一部分,则在盲授权资源上传输第一数据的一部分,然后在下一传输周期继续使用该盲授权资源传输第一数据中剩余的部分。或者,若第一数据的全部或一部分传输失败,终端设备可以在下一传输周期继续使用该盲授权资源重传第一数据的全部或一部分。而RA机制和SR机制接入技术中的授权资源仅用于传输指定的数据,数据成功传输后授权资源就被释放,不能用于传输新数据。相当于若终端设备在授权资源上传输了第一数据的一部分,该部分数据成功传输后授权资源就被释放,而不能用于传输第一数据中剩余的部分。并且,若该授权资源为SPS机制接入技术中的授权资源,若终端设备传输一个数据失败,终端设备不能使用该授权资源重传传输失败的数据,而只能使用该授权资源传输终端设备周期性的产生的新数据。相当于若终端设备在授权资源上传输了第一数据的全部或一部分,且该第一数据的全部或一部分传输失败,则终端设备不能使用该授权资源重传传输失败的数据。
需要说明的是,盲授权资源还可以传输第一数据以外的其他数据。比如,可以传输终端设备新产生的数据,或者,终端设备之前缓存的除第一数据外的数据。
在本申请实施例中,网络设备确定终端设备在免授权传输失败后,可以向终端设备发送盲授权消息#1,该盲授权消息#1可以包括传输资源#1(即,盲授权资源的一例)的信息,即,资源指示信息#A(即,资源指示信息的一例)。终端设备通过该盲授权消息#1中的资源指示信息#A,可以确定传输资源#1。终端设备可以在传输资源#1上传输第二数据,第二数据为第一数据的部分或全部。
盲授权资源可以理解为周期性的一块资源。例如,将盲授权资源的周期记作:P,则P表示盲授权资源循环出现的时间长度,即每隔P出现一次该盲授权资源。P可以是系统中的一个子帧或时隙,也可以是多个子帧或时隙,或多个正交频分复用(Orthogonal Frequency Division Multiplexing,OFDM)符号,本申请实施例对此不作限定。盲授权资源可以是P内的一个时频资源块,具体来说它可以占用P内全部OFDM符号和部分子载波,也可以占用P内部分OFDM符号和全部载波,或者占用P内部分OFDM符号和部分子载波。具体如何指示一个盲授权资源,本申请不作具体限定。P可以和免授权传输周期相同或不同。
可选地,作为本申请另一实施例,盲授权消息中的循环冗余校验码CRC可以采用第一标识加扰。以下,将第一标识记作:B-RNTI#1。B-RNTI(Blind-grant Radio Network Tempory Identity),可以称之为盲授权无线网络临时标识。
若网络设备向该终端设备发送的下行消息中的CRC采用B-RNTI#1,则该下行消息为盲授权消息。比如,网络设备可以采用B-RNTI#1加扰盲授权消息#1中的CRC,终端设备若采用B-RNTI#1对该盲授权消息#1解扰成功,则可以确定该盲授权消息#1为盲授权消息。
在具体地实现时,终端设备在开始免授权传输后,可以在后续的每个传输周期,例如免授权传输周期,都尝试使用B-RNTI#1解扰下行消息中的CRC。若采用B-RNTI#1解扰成功,终端设备可以确定该下行消息为盲授权消息。
可选地,作为本申请一个实施例,盲授权消息可以包括指示信息#1(即,第三指示信息的一例)。
指示信息#1用于指示盲授权消息是网络设备在检测到终端设备免授权传输数据失败后,向终端设备授权传输资源的消息。也就是说,若一个下行消息包括指示信息#1,则该下行消息为盲授权消息,或者说该下行消息是网络设备在检测到终端设备免授权传输数据失败后向终端设备授权 传输资源的消息。
例如,盲授权消息#1可以包括指示信息#1。终端设备若检测到盲授权消息#1包括指示信息#1,则可以确定盲授权消息#1为网络设备在检测到终端设备免授权传输第一数据失败后向终端设备授权传输资源的消息,并且可以根据盲授权消息#1中的资源指示信息#A,确定传输资源#1。
在一种可能的实现方式中,盲授权消息可以是某种格式的下行控制信息(指信息本身是下行传输的)。所述下行控制信息中包含一个类型字段以指示所述下行控制信息中的包含的信息具体为何种信息,例如,类型字段取第一值,表示所述下行控制信息包含的是盲授权信息,所述类型字段取其它值时表示所述下行控制信息包含的是其它某种信息。这里的第一值例如可以是0或1等,本申请实施例对此不作限定。
如此,终端设备在接收盲授权消息时,使用的RNTI和其它某种或多种下行控制信息所使用的RNTI相同,例如C-RNTI。这样,对现有技术的改动较小,能够更好地兼容现有技术。
可选地,作为本申请一个实施例,在S502之前,该方法还可以包括:
S501,网络设备向终端设备发送传输配置消息#1(即,传输配置消息的一例)。其中,该传输配置消息#1可以包括第一标识,即B-RNTI#1。
例如,终端设备通过传输配置消息#1获得B-RNTI#1后,可以在后续的每个传输周期,例如免授权传输周期,都尝试使用B-RNTI#1解扰下行消息中的CRC,若采用B-RNTI#1解扰成功,终端设备可以确定该下行消息为盲授权消息,进而可以获得盲授权资源。
本申请实施例中,该传输配置消息#1可以是RRC消息、MAC CE等,本申请实施例对此不作限定。
进一步地,该传输配置消息#1可以包括传输周期指示信息和/或释放时长指示信息。
该传输周期指示信息用于指示上述传输周期P。传输周期P具体可以参见上文描述,为了简洁,此处不再赘述。
应理解,在本申请实施例中,P也可以是预定义的或者系统规定的,本申请实施例并不限定传输周期P的配置方式和大小。
该释放时长指示信息用于指示周期数C。周期数C表示:若连续C个传输周期即连续C个P内网络设备都没有在盲授权资源(比如,传输资源#1)上接收到终端设备发送的数据,则网络设备可以释放盲授权资源。
还应理解,C也可以是预定义的或者系统规定的。比如,考虑到URLLC的低时延特性,终端设备若有后续数据应该立即传输,因此C可以取比较小的固定值,例如2。本申请实施例也不限定C的大小和配置方式。
S504,终端设备在传输资源#1上向网络设备发送数据#1(即,第二数据的一例)。相应地,网络设备在传输资源#1上检测终端设备发送的数据#1。
具体地,终端设备获得传输资源#1之后,可以停止免授权传输,而使用传输资源#1传输之前免授权传输的数据,即第一数据。如果传输资源#1不足以传输终端设备之前免授权传输的数据量,终端设备可以利用传输资源#1传输部分数据,成功后再次利用传输资源#1传输剩余的数据。如果传输资源#1足够大,终端设备可以利用传输资源#1传输包含之前免授权传输的数据在内的更多数据。这里以终端设备在传输资源#1上传输数据#1为例来进行描述。其中,数据#1可以是第一数据的部分或全部。
以下,分多种情况,对S504之后可能的实施方式进行详细描述。
情况一
在S504之后,网络设备正确接收数据#1。
在此情况下,该方法还可以包括:
S506a,网络设备向终端设备发送ACK。
若数据#1为第一数据的全部,或者若数据#1为第一数据的全部且终端设备没有其他需要向网络设备发送的数据,终端设备接收到网络设备发送的ACK后,可以停止数据传输过程。
情况二
在S504之后,网络设备没有正确接收数据#1。此时,网络设备不会向终端设备发送ACK,或者网络设备向终端设备发送NACK。对于终端设备来讲,终端设备不会在发送数据#1之后的预定时间内接收到ACK,或者终端设备会在发送数据#1之后的预定时间内接收到NACK。
在此情况下,该方法还可以包括:
S506b,终端设备在传输资源#1上重传数据#1。
即,终端设备在下一个传输周期的传输资源#1上重传数据#1。
若数据#1为第一数据的一部分,待数据#1传输成功后,终端设备可以执行S508。
S508,终端设备在传输资源#1上向网络设备发送数据#2。相应地,网络设备在传输资源#1上检测数据#2。其中,数据#2为第一数据中除数据#1之外的数据中的一部分或全部。
应理解,若传输资源#1足够传输第一数据中除数据#1之外的数据中的全部,则在S508中终端设备可以传输第一数据中除数据#1之外的数据中的全部。若传输资源#1不足以传输第一数据中除数据#1之外的数据中的全部,则在S508中终端设备可以传输第一数据中除数据#1之外的数据中的一部分。
还应理解,本申请实施例中,网络设备未正确或没有正确接收数据#1是指:网络设备在传输资源#1上检测到信号但不能成功解析,即网络设备确定终端设备在传输数据但由于受到干扰而不能正确接收,此时网络设备向终端设备发送NACK。或者,网络设备在传输资源#1上没有检测到信号,网络设备认为终端设备没有在传输,此时网络设备不需要向终端设备发送NACK。这里所说的没有检测到信号,是指网络设备在传输资源#1检测到的接收功率低于一个阈值pw,而所说的检测到信号,是指网络设备在传输资源#1检测到的接收功率高于所述的阈值pw。
本申请实施例的传输方法,在终端设备免授权传输失败后,网络设备可以立即通过第一授权消息向终端设备授权传输资源,使得终端设备可以多次利用该传输资源传输免授权传输失败的数据,实现了免授权传输失败后,快速转授权传输的目的。并且,由于不需要使用免授权传输方式传输数据,能够达到快速传输数据的目的,从而能够减小传输时延。
以下,对本申请的一些可能的实施例进行描述。
可选地,作为本申请一个实施例,该方法还可以包括:
S505a,终端设备向网络设备发送指示信息#2(即,第一指示信息的一例)和/或指示信息#3(即,第二指示信息的一例)。
其中,指示信息#2用于指示终端设备在传输完数据#1后,是否还有数据#1之外的其他数据需要使用传输资源#1传输。指示信息#3用于指示终端设备是否需要不同于传输资源#1的其他传输资源。该其他传输资源可以是大小大于传输资源#1的一块传输资源,但在该其他传输资源生效的同时传输资源#1被释放。或者,该其他传输资源可以是大小不限的一块传输资源,终端设备可以同时使用该其他传输资源和传输资源#1。
具体地,终端设备在发送数据#1的同时,或者在发送数据#1之前,或者在发送数据#1之后,还可以向网络设备发送指示信息#2和/或指示信息#3。例如,通过指示信息#2向网络设备指示该终端设备在传输完数据#1后是否还有除数据#1外的其他数据需要使用传输资源#1传输。再如,通过指示信息#3向网络设备指示该终端设备是否需要不同于传输资源#1的其他传输资源。
需要说明的是,数据#1与指示信息#2同时传输可以是数据#1与指示信息#2在同一数据帧内(例如,第一数据帧)传输,类似地,数据#1与指示信息#3同时传输可以是数据#1与指示信息#3在同一数据帧(例如,第二数据帧)内传输,但本申请实施例对此不作限定。比如,数据#1与指示信息#2也可以通过同一时间内传输的两个不同的数据帧携带。这里,终端设备在传输完数据#1后没有除数据#1外的其他数据需要使用传输资源#1传输,可以理解为,终端设备在传输完数据#1之后,没有其他或更多的数据需要向网络设备传输。比如,数据#1为第一数据的全部,终端设备在传输完数据#1之后,没有其他或更多的数据需要向网络设备传输。终端设备在传输完数据#1后还有除数据#1外的其他数据需要使用传输资源#1传输,可以理解为,终端设备在传输完数据#1之后,还有其他或更多的数据需要向网络设备传输。比如,数据#1为第一数据的一部分,终端设备在传输完第一数据的该部分之后,还需要传输第一数据的剩余部分。
类似地,终端设备不需要不同于传输资源#1的其他传输资源,可以理解为,终端设备不需要更多的传输资源。例如,数据#1为终端设备需要向网络设备发送的全部数据,比如,数据#1为第一数据的全部。或者,终端设备在成功传输数据#1后,再传输若干次,比如一次或两次,就可以传输完该终端设备需要向网络设备发送的所有数据。比如,数据#1为第一数据的一部分,终端设备在成功传输数据#1后,再传输一次或两次,就可以传输完第一数据的剩余部分。此时,终端设备不需要更多的传输资源。终端设备需要不同于传输资源#1的其他传输资源,可以理解为,终端设备需要更多的传输资源。例如,终端设备不能若干次,比如一次或两次,就传输完其需要向网络设备发送的所有数据。比如,终端设备不能一次或两次就传输完第一数据,而需要更多或者更大的传输资源尽快地将需要向网络设备发送的所有数据都传输完,以降低传输时延。
作为指示信息#2的一种可能的实现方式,指示信息#2可以是在传输资源#1中的DMRS资源上发送的第一DMRS序列或第二DMRS序列。若指示信息#2是第一DMRS序列,指示信息#2指示终端设备在传输完数据#1后没有除数据#1外的其他数据需要使用传输资源#1传输。若指示信息#2是第二DMRS序列,指示信息#2指示终端设备在传输完数据#1后还有除数据#1外的其他数据需要使用传输资源#1传输。应理解,DMRS资源为发送DMRS序列的资源,一般地,DMRS序列和数据一同传输。
也就是说,在发送数据#1的同时,若终端设备在传输完数据#1后没有除数据#1外的其他数据需要使用传输资源#1传输,则向网络设备发送第一DMRS序列;若终端设备在传输完数据#1后还有除数据#1外的其他数据需要使用传输资源#1传输,则向网络设备发送第二DMRS序列。网络设备根据接收或检测到的是第一DMRS序列还是第二DMRS序列,可判断出终端设备在传输完数据#1后是否还有除数据#1外的其他数据需要使用传输资源#1传输。比如,若网络设备在传输资源#1上检测数据的同时检测到第一DMRS序列,则网络设备可以确定终端设备在传输完当前数据(即数据#1)后没有除当前数据外的其他数据需要使用传输资源#1传输。若网络设备在传输资源#1上检测数据的同时检测到第二DMRS序列,则网络设备可以确定终端设备在传输完当前数据(即数据#1)后还有除当前数据外的其他数据需要使用传输资源#1传输。
进一步地,若终端设备在传输完数据#1后没有除数据#1外的其他数据需要使用传输资源#1 传输,则网络设备可以在正确接收数据#1后的若干个传输周期后释放传输资源#1。由于ACK信号的传输可靠性很高,终端设备接收不到ACK的可能性极低,因此网络设备可以在确定终端设备没有除数据#1外的其他数据需要传输的情况下,立即释放传输资源#1,以提高资源利用效率。
或者,如果终端设备在传输完数据#1后还有除数据#1外的其他数据需要使用传输资源#1传输,则网络设备保留传输资源#1,直至终端设备传输完第一数据,或者传输完所有需要向网络设备发送的数据。
作为指示信息#2的另一可能的实现方式,指示信息#2还可以是一个比特的信息。比如,指示信息#2为0,表示终端设备在传输完数据#1后没有除数据#1外的其他数据需要向网络设备传输。指示信息#2为1,表示终端设备在传输完数据#1后还有除数据#1外其他数据需要向网络设备传输。比特值为0和1的含义也可以定义为与该例子相反的含义,本申请实施例对此不作限定。本申请实施例也不限定指示信息#2所占用的比特位,此处仅以指示信息#2占用一个比特位为例进行说明。
综上,在该实施例中,终端设备通过指示信息#2向网络设备指示该终端设备是否还有更多数据需要传输,使得在终端设备没有更多数据传输时,网络设备可以及时释放所授权资源,避免资源浪费。
作为指示信息#3的一种可能的实现方式,指示信息#3可以是在传输资源#1中的DMRS资源上发送的第三DMRS序列或第四DMRS序列。若指示信息#3是第三DMRS序列,指示信息#3指示终端设备不需要不同于传输资源#1的其他传输资源;若指示信息#3是第四DMRS序列,指示信息#3指示终端设备需要不同于传输资源#1的其他传输资源。
也就是说,若终端设备不需要不同于传输资源#1的其他传输资源,终端设备可以在发送数据#1的同时,向网络设备发送第三DMRS序列,若终端设备需要不同于传输资源#1的其他传输资源,则向网络设备发送第四DMRS序列。网络设备根据接收到的是第三DMRS序列还是第四DMRS序列,可判断出终端设备是否需要不同于传输资源#1的其他传输资源。
进一步地,若终端设备需要不同于传输资源#1外的其他传输资源,在S505a之后,网络设备可以向终端设备发送盲授权消息#2(即,第二授权消息的一例)。然后,终端设备根据盲授权消息#2,使用传输资源#2向所述网络设备传输数据#3(即,第四数据的一例)。
其中,盲授权消息#2用于指示传输资源#2。并且,终端设备能够在传输资源#1和传输资源#2上向网络设备传输数据,或者传输资源#2的大小大于传输资源#1且终端设备能够在传输资源#2上而不能够在传输资源#1上向网络设备传输数据#3。
数据#3可以是数据#1传输成功之后更大的一块数据,比如,数据#1为第一数据的一小部分,数据#3可以是第一数据中剩余的一大部分。又如,数据#1可以是除第一数据外的终端设备需要向网络设备发送的其他数据。或者,在数据#1未传输成功时,数据#3包含数据#1。或者,在数据#1没有传输成功的情况下,可以继续在传输资源#1上传输数据#1,并在传输资源#2上传输数据#3(这里的数据#3可以包含第一数据中除数据#1外的全部)。
应理解,数据#3和S508中的数据#2可以相同,也可以不同,本申请实施例对此不作限定。
具体地,传输资源#2的大小可以大于传输资源#1,例如,传输资源#2的大小可以是传输资源#1的大小的2倍,但本申请实施例对此不作限定。网络设备向终端设备授权传输资源#2的同时,释放传输资源#1。终端设备接收到盲授权消息#2后,只能在传输资源#2上向网络设备发送数据#3。或者,网络设备向终端设备授权大小不限的传输资源#2,并且保留传输资源#1,终端设备可以同时在传输资源#1和传输资源#2上向网络设备发送数据#3。
进一步地,以传输资源#2为传输资源#1的补充,即网络设备授权传输资源#2的同时保留传输资源#1为例。若网络设备连续C个传输周期都没有在传输资源#1和传输资源#2上检测到信号,即终端设备连续C个传输周期没有在传输资源#1和传输资源#2上发送数据,则网络设备释放传输资源#1和传输资源#2,以便将传输资源#1和传输资源#2用作其它用途。比如,终端设备在成功发送数据#3后没有更多数据需要发送,传输资源#1和传输资源#2被空置,网络设备连续C个传输周期都发现传输资源#1上没有数据传输,则释放传输资源#1和传输资源#2。
如此,终端设备在没有数据传输时,网络设备可以释放盲授权资源,以将该盲授权资源用作其他用途,从而能够提高资源利用率,避免资源的浪费。
作为指示信息#3的另一可能的实现方式,指示信息#3可以是一个比特的信息。比如,指示信息#3为0,表示终端设备不需要不同于传输资源#1的其他传输资源。指示信息#3为1,表示终端设备需要不同于传输资源#1的其他传输资源。比特值为0和1的含义也可以定义为与该例子相反的含义,本申请实施例对此不作限定。本申请实施例也不限定指示信息#3所占用的比特位,此处仅以指示信息#3占用一个比特位为例进行说明。
综上,在该实施例中,终端设备通过指示信息#3向网络设备指示该终端设备是否还需要更多的传输资源,使得在盲授权资源远小于终端设备待传输数据所需资源时,终端设备可以在传输部分数据的同时获取更大资源,从而能够减少用于请求传输资源的的信令交互,降低传输时延。
应理解,终端设备可以只发送指示信息#2和指示信息#3中的其中之一,也可以将二者都发送给网络设备,本申请实施例对此不作限定。若终端设备将二者都发送给网络设备,二者可以同时发送,也可以不同时发送,本申请对二者之间的发送顺序不作限定。
可选地,在本申请实施例中,第一DMRS序列、第二DMRS序列、第三DMRS序列、和/或第四DMRS序列可以通过盲授权消息#1或系统广播信息或上文中的传输配置消息#1携带,本申请实施例对此不作限定。
应理解,以指示信息#2为例,指示信息#3同理可得。若指示信息#2不是DMRS序列,而是其他的信号(比如,参考信号)或信息等,该其他的信号(比如,参考信号)或信息也可以通过盲授权消息#1或系统广播信息或上文中的传输配置消息#1携带,本申请实施例对此不作限定。
还应理解,以盲授权消息#1携带第一DMRS和/或第二DMRS序列为例,盲授权消息#1可以仅携带第一DMRS序列,第二DMRS序列可以根据第一DMRS序列以及预设的公式获得。或者,盲授权消息#1可以仅携带第二DMRS序列,第一DMRS序列可以根据第二DMRS序列以及预设的公式获得。或者,盲授权消息#1可以同时携带第一DMRS序列和第二DMRS序列。或者,盲授权消息#1可以仅携带第二DMRS序列,第一DMRS序列已经在终端设备与网络设备的其它交互中携带,本申请实施例对此不作限定。
以下,对传输指示信息#2和/或指示信息#3的传输资源进行介绍。
本文中,将传输指示信息#2和/或指示信息#3的传输资源记作:传输资源#D。
终端设备可以只在传输资源#D上传输指示信息#2,也可以只在传输资源#D上传输指示信息#3,或者在传输资源#D上同时传输指示信息#2和指示信息#3。
应理解,传输资源#D可以是一个与传输资源#1并行的资源。传输资源#D与传输资源#1并行的意思是二者同时存在,或者同时被释放。
可选地,传输资源#D可以位于传输资源#1中的固定位置上,即,传输资源#D为传输资源#1中的固定资源。
例如,指示信息#2和/或指示信息#3为DMRS序列时,传输资源#D可以位于传输资源#1中的固定位置上。
可选地,传输资源#D也可以是传输资源#1以外的资源,即,传输资源#D与传输资源#1不重叠。
例如,传输资源#D可以是一个控制信息传输资源,可以位于物理上行控制信道中,但本申请实施例对此不作限定。
在本申请实施例中,传输资源#D可以是预定义的,或者,可以根据传输资源#1的位置获得,或者,可以通过资源指示信息#B进行指示,本申请实施例对此不作限定。
这里,资源指示信息#B用于终端设备确定传输资源#D,即终端设备根据资源指示信息#B可以确定传输资源#D。
资源指示信息#B可以通过盲授权消息#1携带,也可以通过系统广播信息携带,或者还可以通过上文中的S501中的传输配置消息#1携带,本申请实施例对此不作限定。
可选地,作为本申请另一实施例,该方法还可以包括:
S505b,终端设备向网络设备发送指示信息#4(即,第四指示信息的一例)。
应理解,S505a和S505b可以则其一执行,但本申请实施例对此不作限定。
其中,指示信息#4用于指示终端设备在传输完数据#1后是否还有除数据#1外的其他数据需要向网络设备传输,以及是否需要不同于传输资源#1的其他传输资源。
例如,指示信息#4可以是第五DMRS序列,第五DMRS序列可以指示终端设备在传输完数据#1后没有除数据#1外的其他数据需要向网络设备传输,自然也隐含指示该终端设备不需要不同于传输资源#1的其他传输资源。或者,指示信息#4可以是第六DMRS序列,第六DMRS序列指示终端设备在传输完数据#1后还有除数据#1外的其他数据需要向网络设备传输,但不需要不同于传输资源#1的其他传输资源。这里的意思是,终端设备使用传输资源#1传输少量几次,例如一次或两次,就可以传输完该终端设备需要向网络设备发送的所有数据,比如第一数据,而没有必要再获得其他的传输资源。或者,指示信息#4可以是第七DMRS序列,第七DMRS序列指示终端设备需要不同于传输资源#1的其他传输资源,隐含指示该终端设备在传输完数据#1后还有除数据#1外的其他数据需要向网络设备传输。
再如,指示信息#4可以是2比特的信息,“00”、“01”、“10”分别表示上述三种含义,但本申请实施例并不限定指示信息#4所占用的比特数,也不限定比特值的具体含义。
关于指示信息#4的内容、其所指示的含义、传输指示信息#4的资源均可以参照上述中对指示信息#2和指示信息#3的描述,为了简洁,此处不再赘述。此外,关于第五DMRS序列、第六DMRS序列和第七DMRS序列的相应内容,比如通过何种信息携带等,可以参照上述中对第一DMRS序列、第二DMRS序列、第三DMRS序列和/或第四DMRS序列的描述,这里也不再赘述。
应理解,第一DMRS序列、第三DMRS序列和第五DMRS序列可以相等,也可以不等,本申请实施例对此不作限定。第二DMRS序列、第二DMRS序列可以相等,也可以不等,本申请实施例对此不作限定。
还应理解,本申请实施中,不同的终端设备可以采用相同的或不同的DMRS序列作为指示信息#2、指示信息#3和/或指示信息#4,本申请实施例对此不作限定。
下面,结合图6所示的本申请的一个具体实施例,对本申请进行详细描述。
图6示出了本申请一个具体实施例的传输方法600的示意性交互图。应理解,图6所示的方 法600仅为示意性说明,不应对本申请构成任何限定。
S601,网络设备向终端设备发送传输配置消息#1。
其中,该传输配置信息#1包括B-RNTI#1、传输周期P、第三DMRS序列和第四DMRS序列。
DMRS是终端设备传输数据时的参考信号,在一个CTA中每个终端设备都使用一个专用的DMRS序列作为终端设备的标识,以便网络设备在接收一个CTU上的传输时,通过DMRS传输资源承载的DMRS序列识别这个传输来自哪个终端设备。由于DMRS序列资源有限,对于CTA中的免授权传输,一个终端设备只能分配一个DMRS序列。但是在授权传输中,终端设备的数据传输是在指定的授权数据传输资源上进行的,网络设备并不需要根据DMRS序列来识别是哪个终端设备在发送。因此,在授权传输中,终端设备可以使用任意DMRS序列。
因此,终端设备可以在GF2GB后的盲授权传输中,使用一个DMRS序列,如第三DMRS序列指示不需要更大的传输资源,即当前的盲授权资源够用,标记为MR=0,而使用另一个DMRS序列,如第四DMRS序列指示需要更大的传输资源,以尽快完成剩余的大量数据的传输,标记为MR=1。
S602,终端设备进行免授权传输。
例如,终端设备在产生URLLC数据后,采用免授权传输。免授权传输的具体过程这里不再详述。如果免授权传输成功,则传输过程结束,不会进入后续步骤。如果免授权传输失败或免授权传输过程中满足GF2GB的触发条件而触发GF2GB过程,则进入步骤S603。具体网络设备在什么时机发起GF2GB过程,本申请不作具体规定。
S603,网络设备向终端设备发送盲授权消息#1。
网络设备通过检测CTU的DMRS序列获知终端设备在进行免授权传输,但在首次或多次未能成功接收终端设备传输的数据时,启动GF2GB过程,向终端设备发送盲授权消息#1,该盲授权消息#1包含传输资源#1的信息。盲授权消息#1的CRC使用配置给终端设备的B-RNTI#1加扰。
终端设备在开始免授权传输后,可以在后续的每个免授权传输周期或时隙都尝试使用B-RNTI#1接收盲授权消息,若接收到网络设备发给自己的盲授权消息#1,则可以从该盲授权消息#1中获得传输资源#1的信息。
S604,终端设备在传输资源#1上传输数据#1以及第四DMRS序列。其中,数据#1为第一数据的一部分。
具体地,终端设备在传输数据#1的同时,还同时向网络设备发送第四DMRS序列,指示终端设备需要不同于传输资源#1的其他传输资源,即终端设备需要更大的传输资源,即MR=1。
S605,网络设备向终端设备发送ACK。
具体地,如果网络设备正确收到终端设备的数据#1,则反馈ACK表示收到终端设备的数据#1。网络设备每次接收数据时都需要根据终端设备传输的MR指示判断终端设备是否需要更大传输资源传输上行数据。如果终端设备不需要更大的传输资源,则可以为终端设备保留传输资源#1以便终端设备传输更多数据,如果终端设备需要更大的传输资源,则网络设备可以立即向终端设备授权更大的传输资源。
S606,网络设备向终端设备发送盲授权消息#2。
其中,盲授权消息#2包括传输资源#2的信息,并且盲授权消息#2的CRC使用配置给终端设备的B-RNTI#1加扰。
具体地,网络设备正确收到了终端设备发送的数据#1,向终端设备反馈ACK,同时因为终端 设备指示该终端设备需要更大的传输资源,因此网络设备为终端设备分配更大的传输资源。这里,以网络设备分配大小大于传输资源#1的传输资源#2,且回收或释放传输资源#1为例进行说明。
S607,终端设备在传输资源#2上发送数据#2和第三DMRS序列。
具体地,终端设备在成功发送数据#1后,还有其他的数据需要发送,则在传输资源#2上向网络设备发送数据#2。同时因为没有更多数据或者剩下数据不多,终端设备使用第三DMRS序列向网络设备指示该终端设备不需要更大的传输资源,即MR=0。
应理解,数据#2包括第一数据中除数据#1之外的其他部分。并且,数据#2还可以包括除第一数据中除数据#1之外的其他部分之外的其他数据,本申请实施例对此不作限定。
S608,网络设备向终端设备发送NACK。
具体地,如果网络设备未能正确接收终端设备在传输资源#2上发送的数据#2,则向终端设备反馈NACK以指示未正确接收到数据。并且,网络设备检测到MR=0,不为终端设备分配更大的传输资源。
而如果终端设备在S607中指示MR=1,即使网络设备向终端设备反馈NACK,也会立即向终端设备发送盲授权消息授权更大的传输资源。即网络设备是否给终端设备授权更大的传输资源只和MR指示有关,和本次接收数据是否成功无关。如果本次接收数据失败,并且网络设备给终端设备授权了更大的传输资源,则终端设备在下次传输时会在更大的传输资源上重传上次传输失败的数据以及更多的首传数据。
S609,终端设备在传输资源#2上重传数据#2,并发送第三DMRS序列。
具体地,终端设备没有发送数据#2之后的预定时间内接收到ACK,则在传输资源#2上重传之前传输的数据#2。同时因为没有更多数据或者剩下数据不多,终端设备使用第三DMRS序列向网络设备指示该终端设备不需要更大的传输资源,即MR=0。
S610,网络设备向终端设备发送ACK。
具体地,网络设备成功接收到终端设备的发送的数据,即数据#2,向终端设备发送ACK。
S611,网络设备释放传输资源#2。
具体地,因为C个传输周期内网络设备未收到终端设备发送的数据,网络设备释放授权给终端设备的资源,即传输资源#2。
本申请实施例的传输方法,在终端设备免授权传输失败后,网络设备可以立即通过第一授权消息向终端设备授权传输资源,使得终端设备可以多次利用该传输资源传输免授权传输失败的数据,实现了免授权传输失败后,快速转授权传输的目的。并且,由于不需要使用免授权传输方式传输数据,能够达到快速传输数据的目的,从而能够减小传输时延。
图7是根据本申请另一实施例的传输方法的示意性交互图。应理解,图7示出了方法700的详细的步骤或操作,但这些步骤或操作仅是示例,本申请实施例还可以执行其它操作或仅执行图7中部分操作。
应理解,该方法700可以由网络设备和终端设备执行。其中,网络设备可以是系统100中的网络设备101,终端设备可以是上述系统100中的终端设备102或终端设备103。
S702,网络设备向终端设备发送盲授权消息#3(即,第一授权消息的一例)。
其中,盲授权消息#3是网络设备在检测到终端设备免授权传输第一数据失败后,向终端设备授权传输资源的消息。盲授权消息#3包括资源指示信息#C(即,第一资源指示信息的一例),资源指示信息#C指示传输资源#3(即,第一传输资源的一例),传输资源#3至少用于终端设备传 输一个资源请求消息。
具体地,网络设备确定终端设备在免授权传输失败后,可以向终端设备发送盲授权消息#3,该盲授权消息#3可以包括传输资源#3(即,盲授权资源的一例)的信息,即,资源指示信息#C(即,第一资源指示信息的一例)。终端设备通过该盲授权消息#3中的资源指示信息#C,可以确定传输资源#3,终端设备至少可以在传输资源#3上向网络设备发送资源请求消息。
应理解,盲授权消息#3可以是上文所描述的盲授权消息,具体地可以参见上文的描述,为了简洁,此处不再赘述。
需要说明的是,传输资源#3与上文中的盲授权资源不同的是,盲授权资源用于终端设备传输数据,而传输资源#3可以用于终端设备发送资源请求消息。若传输资源#3的大小大于传输一个资源请求消息所需资源的大小,传输资源#3还可以用于终端设备传输数据。
可选地,作为本申请一个实施例,盲授权消息#3可以包括指示信息#5。
具体地,指示信息#5用于指示盲授权消息#3是网络设备在检测到终端设备免授权传输第一数据失败后,网络设备向终端设备授权传输资源的消息。终端设备若检测到盲授权消息#3包括指示信息#5,则可以确定盲授权消息#3为网络设备在检测到终端设备免授权传输第一数据失败后,向终端设备授权传输资源的消息,并且可以根据盲授权消息#3中的资源指示信息#C,确定传输资源#3。
应理解,指示信息#5可以上文中的指示信息#1,具体地可以参照上述中关于指示信息#1的描述,为了简洁,此处不再赘述。
可选地,作为本申请另一实施例,盲授权消息#3中的循环冗余校验码CRC可以采用第二标识加扰。以下,将第二标识记作:B-RNTI#2。
若网络设备向该终端设备发送的下行消息中的CRC采用B-RNTI#2,则该下行消息为盲授权消息。比如,网络设备可以采用B-RNTI#2加扰盲授权消息#3中的CRC,终端设备若采用B-RNTI#2对该盲授权消息#3解扰成功,则可以确定该盲授权消息#3为盲授权消息。
在具体地实现时,终端设备在开始免授权传输后,可以在后续的每个传输周期,例如免授权传输周期,都尝试使用B-RNTI#2解扰下行消息中的CRC。若采用B-RNTI#2解扰成功,终端设备可以确定该下行消息为盲授权消息。
应理解,B-RNTI#2可以与B-RNTI#1相同,也可以不同,本申请实施例对此不作限定。
可选地,作为本申请一个实施例,在S702之前,该方法还可以包括:
S701,网络设备向终端设备发送传输配置消息#2(即,传输配置消息的一例)。其中,该传输配置消息#2可以包括第二标识,即B-RNTI#2。
例如,终端设备通过传输配置消息#2获得B-RNTI#2后,可以在后续的每个用于传输该终端设备的业务数据的传输周期,例如免授权传输周期,都尝试使用B-RNTI#2解扰下行消息中的CRC,若采用B-RNTI#2解扰成功,终端设备可以确定该下行消息为盲授权消息,进而可以获得盲授权资源。
本申请实施例中,该传输配置消息#2可以是RRC消息、MAC CE等,本申请实施例对此不作限定。
S704,终端设备在传输资源#3上向网络设备发送资源请求消息。
该资源请求消息包括资源需求信息,该资源需求信息指示数据#4(即,第二数据的一例)大小或传输数据#4需要的传输资源的大小。例如,该资源请求消息可以是BSR或BSR消息。网络 设备接收到资源需求信息后,可以确定终端设备即将传输的数据,即数据#4的大小,或者可以确定终端设备所需的传输资源的大小。其中,数据#4为第一数据的部分或全部。
可选地,若传输资源#3的大小大于传输一个资源请求消息所需资源的大小,在S704中,终端设备还可以在传输资源#3向网络设备发送数据#5。其中,数据#5为第一数据中除数据#4外的全部数据。即,第一数据由数据#4和数据#5组成。
也就是说,若传输资源#3足够大,终端设备可以同时在传输资源#3上传输资源请求消息和第一数据的一部分。
S706,网络设备向终端设备发送授权消息#1(即,第二授权消息的一例)。
其中,授权消息#1包括资源指示信息#D(即,第二资源指示信息的一例)。资源指示信息#D指示传输资源#4(即,第二传输资源的一例),传输资源#4用于终端设备传输数据#4。
具体地,网络设备接收到终端设备发送的资源请求消息后,可以确定终端设备需要的传输资源的大小。然后,网络设备通过授权消息#1向终端设备授权传输资源#4,以使终端设备在传输资源#4上传输数据#4。
应理解,授权消息#1中授权的传输资源#4不再是盲目的,而是明确地根据资源请求消息中指示的需求分配的,可以和普通的授权传输相同。因此授权消息#1也可以不是盲授权消息,而是传统的上行授权消息。
S708,终端设备在传输资源#4上向网络设备发送数据#4。
应理解,若传输资源#3的大小只能够传输一个资源请求消息,那么S708中的数据#4则为第一数据的全部。若传输资源#3的大小大于传输一个资源请求消息所需资源的大小,且在S704中终端设备还在传输资源#3上传输了数据#5,那么数据#4为第一数据中除数据#5外的全部数据。
可选地,在S708之后,该方法还可以包括:
若网络设备正确接收数据#4,则网络设备可以立即释放传输资源#4。
由于传输资源#4是网络设备根据数据#4的大小分配的,因此网络设备可以在正确接收数据#4的情况下立即释放传输资源#4,而不用考虑终端设备是否还有更多数据需要传输,提高了资源利用率。
本申请实施例的传输方法,在免授权传输失败后,网络设备通过第一授权消息向终端设备授权用于传输资源请求消息的资源,终端设备根据第一授权消息中向网络设备发送资源请求消息,网络设备根据该资源请求消息可以在第二授权消息中为终端设备分配足够的资源,使得终端设备可以一次性传输完还需要传输的全部数据,实现了免授权传输失败后,快速转授权传输的目的。并且,本申请实施例的方法,能够减小传输时延。
另外,相对于现有技术中,虽然终端设备也发送了资源请求消息,但由于本申请实施例的方法中,终端设备没有发送资源请求消息就可以获得传输资源请求消息的资源,因此能够减少信令开销,降低传输延迟。
可选地,作为本申请一个实施例,盲授权消息#3还可以包括资源指示信息#E(即,第三资源指示信息的一例)。
其中,资源指示信息#E用于指示传输资源#5(即,第三传输资源的一例),传输资源#5用终端设备传输第一数据的部分或全部。
那么,在S706之前,该方法还可以包括:
S705,终端设备在传输资源#5上传输数据#5。
具体地,若网络设备在S702中同时向终端设备授权了两份资源,即传输资源#3和传输资源#5,那么终端设备可以在传输资源#3上向网络设备发送资源请求消息,在传输资源#5上向网络设备发送第一数据的一部分。
进一步地,传输资源#3可以是上行控制信道资源中的资源,但本申请实施例对此不作限定。
应理解,S705可以和S704同时执行,也可以先与S704之前,或者在S704之前执行,本申请实施例对此不作限定。
还应理解,S705中的终端设备在传输资源#5上传输数据#5,相当于若传输资源#3的大小大于传输一个资源请求消息所需资源的大小,S704中的终端设备可以在传输资源#3向网络设备发送数据#5。
下面,结合图8所示的本申请的一个具体实施例,对本申请进行详细描述。
图8示出了本申请一个具体实施例的传输方法800的示意性交互图。应理解,图8所示的方法800仅为示意性说明,不应对本申请构成任何限定。
S801,网络设备向终端设备发送传输配置消息#2。
其中,该传输配置信息#2包括B-RNTI#2。
S802,终端设备进行免授权传输。
例如,终端设备在产生URLLC数据后,采用免授权传输。免授权传输的具体过程这里不再详述。如果免授权传输成功,则传输过程结束,不会进入后续步骤。如果免授权传输失败或免授权传输过程中满足GF2GB的触发条件而触发GF2GB过程,则进入步骤S803。具体网络设备在什么时机发起GF2GB过程,本申请不作具体规定。
S803,网络设备向终端设备发送盲授权消息#3。
网络设备在接收终端设备的免授权传输过程中,通过检测CTU的DMRS获知终端设备在进行免授权传输,但在首次或多次未能成功接收终端设备传输的数据时,启动GF2GB过程,向终端设备发送盲授权消息#3,该盲授权消息#3包含传输资源#3的信息。盲授权消息#3的CRC使用配置给终端设备的B-RNTI#2加扰。
终端设备在开始免授权传输后,可以在后续的每个免授权传输周期或时隙都尝试使用B-RNTI#2接收盲授权消息,若接收到网络设备发给自己的盲授权消息,从消息中获得传输资源#3的信息。
以下,以传输资源#3的大小能够传输一个资源请求消息以及数据#5为例进行说明。即,第一数据由数据#4和数据#5组成。
S804,终端设备在传输资源#3上传输资源请求消息和数据#5。
该资源请求消息用于指示数据#4的大小或传输数据#4所需的资源大小。
S805,网络设备向终端设备发送ACK。
具体地,如果网络设备正确收到终端设备的数据#5,则向终端设备反馈ACK。并且,网络设备可以立即收回或释放之前授权的传输资源#3。
应理解,如果网络设备未正确接收终端设备的数据#5,可以向终端设备反馈NACK,并可以保留授权的传输资源#3以便终端设备重传数据。
可选地,网络设备可以每次接收数据时都检测是否有该终端设备同时传输的资源请求消息,若有资源请求消息,则无论是否正确接收之前授权的传输资源,都可以立即收回该传输资源,并根据资源请求消息中的信息为终端设备分配新的传输资源。如果之前的传输正确接收,则网络设 备只需要为终端设备分配能传输剩余数据的传输资源,如果之前的传输未能正确接收,则网络设备可以只为终端设备分配能传输全部数据的传输资源,也可以保留之前分配的传输资源,另外分配可传输剩余数据的新传输资源,以便终端设备可以在之前的传输资源上重传前次未正确传输的数据,在新传输资源上传输剩余数据。
S806,网络设备向终端设备发送授权消息#1。授权消息#1的CRC采用B-RNTI#2加扰。
具体地,网络设备通过向终端设备发送授权消息#1,向终端设备授权传输资源#4。
传输资源#4可以完全是一个不同于传输资源#3的资源,且传输资源#3被收回。如果数据#5未传输成功,传输资源#4的大小可以大于传输资源#3,终端设备可以在传输资源#4上传输全部需传输数据,即第一数据。传输资源#4也可以是在传输资源#3的基础上增加一个传输资源,且传输资源#3仍保留用于重传上次未成功传输的数据,即数据#5,传输资源#4则传输剩余的数据,即数据#4。
S807,终端设备在传输资源#4上传输数据#4。
S808,网络设备向终端设备发送NACK。
具体地,网络设备未能正确接收终端设备在在传输资源#4上传输的数据#4,向终端设备反馈NACK以示未正确收到数据。
S809,终端设备在传输资源#4上重传数据#4。
S810,网络设备向终端设备发送ACK。
具体地,网络设备正确接收终端设备在在传输资源#4上传输的数据#4,向终端设备反馈ACK以示正确收到数据。
S811,网络设备释放传输资源#4。
即,网络设备在正确接收数据#4后,可以立即释放传输资源#4。
本申请实施例的传输方法,在免授权传输失败后,网络设备通过第一授权消息向终端设备授权用于传输资源请求消息的资源,终端设备根据第一授权消息中向网络设备发送资源请求消息,网络设备根据该资源请求消息可以在第二授权消息中为终端设备分配足够的资源,使得终端设备可以一次性传输完还需要传输的全部数据,实现了免授权传输失败后,快速转授权传输的目的。并且,本申请实施例的方法,能够减小传输时延。
上文中结合图5至图8描述了根据本申请实施例的传输方法。下文中,结合图9至14,本申请实施例提供的终端设备和网络设备。
图9示出了本申请实施例提供的终端设备900的示意性框图。该终端设备900包括:接收单元910和发送单元920。
接收单元910,用于接收网络设备发送的第一授权消息,所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
发送单元920,用于在所述第一传输资源上向所述网络设备发送第二数据,所述第二数据为所述第一数据的部分或全部。
可选地,在所述发送单元920在发送所述第二数据之后的预定时间内,所述接收单元910未接收到所述网络设备发送的肯定应答ACK的情况下,或,在所述发送单元920在发送所述第二数据之后的预定时间内,所述接收单元910接收到所述网络设备发送的否定应答NACK的情况下, 所述发送单元920还用于:
在所述第一传输资源上重传所述第二数据。
可选地,在所述第二数据为所述第一数据的部分的情况下,若所述发送单元920在发送所述第二数据之后的预定时间内,所述接收单元910接收到所述网络设备发送的肯定应答ACK,所述发送单元920还用于:
在所述第一传输资源上向所述网络设备发送第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
可选地,所述第二数据通过第一数据帧携带,所述第一数据帧还携带第一指示信息,所述第一指示信息用于指示所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
可选地,所述第一指示信息为在所述第一传输资源中的DMRS资源上发送的DMRS序列;
其中,若所述第一指示信息为第一DMRS序列,指示所述终端设备在传输完所述第二数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
若所述第一指示信息为第二DMRS序列,指示所述终端设备在传输完所述第二数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
可选地,所述第二数据通过第二数据帧携带,所述第二数据帧还携带第二指示信息,所述第二指示信息用于指示所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
可选地,所述第二指示信息为在所述第一传输资源中的DMRS资源上发送的DMRS序列;
其中,若所述第二指示信息为第三DMRS序列,指示所述终端设备不需要不同于所述第一传输资源的其他传输资源;
若所述第二指示信息为第四DMRS序列,指示所述终端设备需要不同于所述第一传输资源的其他传输资源。
可选地,若所述第二指示信息指示所述终端设备需要不同于所述第一传输资源的其他传输资源,所述接收单元910还用于:
接收所述网络设备发送的第二授权消息,所述第二授权消息用于指示第二传输资源;
所述发送单元920还用于:
根据所述第二授权消息,使用所述第二传输资源向所述网络设备发送第四数据,所述第四数据包括所述第一数据的部分或全部。
可选地,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述接收单元910用于接收网络设备发送的第一授权消息包括:
采用所述第一标识对所述网络设备发送的至少一个下行消息的CRC进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
可选地,所述第一授权消息包括第三指示信息,所述第三指示信息用于指示所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
可选地,所述接收单元910在接收所述网络设备发送的所述第一授权消息之前,还用于:
接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
应理解,这里的终端设备900以功能单元的形式体现。这里的术语“单元”可以指应用特有 集成电路(application specific integrated circuit,ASIC)、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,终端设备900可以具体为上述方法500和方法600实施例中的终端设备,终端设备900可以用于执行上述方法500和方法600实施例中与终端设备对应的各个流程和/或步骤,为避免重复,在此不再赘述。
图10示出了本申请实施例提供的网络设备1000的示意性框图。该网络设备1000包括:发送单元1010和接收单元1020。
发送单元1010,用于向终端设备发送第一授权消息,所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
接收单元1020,用于在所述第一传输资源上检测所述终端设备发送的第二数据,所述第二数据为所述第一数据的部分或全部。
可选地,所述发送单元1010还用于:
若所述接收单元1020未正确接收所述终端设备发送的所述第二数据,向所述终端设备发送否定应答NACK;
所述接收单元1020还用于,在所述第一传输资源上接收所述终端设备重传的所述第二数据。
可选地,所述发送单元1010还用于:
若所述接收单元1020正确接收所述终端设备发送的所述第二数据,向所述终端设备发送肯定应答ACK;
所述接收单元1020还用于,在所述第一传输资源上检测所述终端设备发送的第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
可选地,所述接收单元1020还用于:
检测第一数据帧所携带的第一指示信息,所述第一数据帧还携带所述第二数据;
其中,所述网络设备还包括:
第一确定单元,用于根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
可选地,所述第一指示信息为在所述第一传输资源中的DMRS资源上发送的DMRS序列;
其中,所述第一确定单元根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输具体包括:
若所述网络设备在所述第一传输资源上检测到第一DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
若所述网络设备在所述第一传输资源上检测到第二DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
可选地,所述接收单元1020还用于:
检测第二数据帧所携带的第二指示信息,所述第二数据帧还携带所述第二数据;其中,所述网络设备还包括:
第二确定单元,用于根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
可选地,所述第二指示信息为在所述第一传输资源中的调制解调参考信号DMRS资源上发送的DMRS序列;
其中,所述第二确定单元根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源具体包括:
若所述网络设备在所述第一传输资源上检测到第三DMRS序列,所述网络设备确定所述终端设备不需要不同于所述第一传输资源的其他传输资源;
若所述网络设备在所述第一传输资源上检测到第四DMRS序列,所述网络设备确定所述终端设备需要不同于所述第一传输资源的其他传输资源。
可选地,若所述第二确定单元确定所述终端设备需要不同于所述第一传输资源的其他传输资源,所述发送单元1010还用于:
所述网络设备向所述终端设备发送第二授权消息,所述第二授权消息用于指示第二传输资源;
所述接收单元1020还用于,在所述第二传输资源上检测所述终端设备发送的第四数据。
可选地,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
可选地,所述第一授权消息包括第三指示信息,所述第三指示信息用于指示所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
可选地,所述发送单元1010在向终端设备发送所述第一授权消息之前,还用于:
向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
应理解,这里的网络设备1000以功能单元的形式体现。这里的术语“单元”可以指ASIC、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,网络设备1000可以具体为上述方法500和方法600实施例中的网络设备,网络设备1000可以用于执行上述方法500和方法600实施例中与网络设备对应的各个流程和/或步骤,为避免重复,在此不再赘述。
图11示出了本申请实施例提供的另一终端设备1100的示意性框图。该终端设备1100包括:接收单元1110和发送单元1120。
接收单元1110,用于接收网络设备发送的第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
发送单元1120,用于在所述第一传输资源上向所述网络设备发送资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
所述接收单元1110还用于,接收所述网络设备发送的第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
所述发送单元1120还用于,在所述第二传输资源上向所述网络设备发送所述第二数据。
可选地,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
其中,所述发送单元1120用于在所述第一传输资源上向所述网络设备发送资源请求消息包括:
所述发送单元1120在所述第一传输资源上向所述网络设备发送第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
可选地,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
其中,所述发送单元1120还用于:
在所述第三传输资源上发送第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
可选地,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述接收单元1110用于接收网络设备发送的第一授权消息包括:
所述接收单元1110采用所述第一标识对所述网络设备发送的至少一个下行消息进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
可选地,所述接收单元1120还用于:
接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
应理解,这里的终端设备1100以功能单元的形式体现。这里的术语“单元”可以指ASIC、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,终端设备1100可以具体为上述方法700和方法800实施例中的终端设备,终端设备1100可以用于执行上述方法700和方法800实施例中与终端设备对应的各个流程和/或步骤,为避免重复,在此不再赘述。
图12示出了本申请实施例提供的另一网络设备1200的示意性框图。该网络设备1200包括:发送单元1210和接收单元1220。
发送单元1210,用于向终端设备发送第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
接收单元1220,用于接收所述终端设备在所述第一传输资源上发送的资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
所述发送单元1210还用于,向所述终端设备发送第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
所述接收单元1220还用于,接收所述终端设备在所述第二传输资源上发送的所述第二数据。
可选地,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
其中,所述接收单元1220用于接收所述终端设备在所述第一传输资源上发送的资源请求消息包括:
所述接收单元1220接收所述终端设备在所述第一传输资源上发送的第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
可选地,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
其中,所述接收单元1220具体用于:
接收所述终端设备在所述第三传输资源上发送的第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
可选地,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
可选地,所述发送单元1210还用于:
向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
应理解,这里的网络设备1200以功能单元的形式体现。这里的术语“单元”可以指ASIC、电子电路、用于执行一个或多个软件或固件程序的处理器(例如共享处理器、专有处理器或组处理器等)和存储器、合并逻辑电路和/或其它支持所描述的功能的合适组件。在一个可选例子中,本领域技术人员可以理解,网络设备1200可以具体为上述方法700和方法800实施例中的网络设备,网络设备1200可以用于执行上述方法700和方法800实施例中与网络设备对应的各个流程和/或步骤,为避免重复,在此不再赘述。
图13示出了本申请实施例提供的终端设备1300。该终端设备1300可以包括处理器1310、收发器1320和存储器1330,该处理器1310、收发器1320和存储器1330通过内部连接通路互相通信。接收单元910、发送单元920、接收单元1110和发送单元1120所实现的相关功能可以由处理器1310控制收发器1320来实现。
该处理器1310可以包括是一个或多个处理器,例如包括一个或多个中央处理单元(central processing unit,CPU),在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器1320用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器1330包括但不限于是随机存取存储器(random access memory,RAM)、只读存储器(read-only memory,ROM)、可擦除可编程存储器(erasable programmable read only memory,EPROM)、只读光盘(compact disc read-only memory,CD-ROM),该存储器1330用于存储相关指令及数据。
存储器1330用于存储终端设备的程序代码和数据,可以为单独的器件或集成在处理器1310中。
具体地,所述处理器1310用于控制收发器与网络设备进行信息传输。具体可参见方法实施例中的描述,在此不再赘述。
可以理解的是,图13仅仅示出了终端设备的简化设计。在实际应用中,终端设备还可以分别 包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的终端设备都在本申请的保护范围之内。
在一种可能的设计中,终端设备1300可以被替换为芯片装置,例如可以为可用于终端设备中的通信芯片,用于实现终端设备中处理器1310的相关功能。该芯片装置可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
图14示出了本申请实施例提供的网络设备1400。该网络设备可以包括处理器1410、收发器1420和存储器1430,该处理器1410、收发器1420和存储器1430通过内部连接通路互相通信。上文中的第一处理单元和第二处理单元所实现的相关功能可以由处理器1410来实现,发送单元1010、接收单元1020、发送单元1210和接收单元1220所实现的相关功能可以由处理器1410控制收发器1420来实现。
该处理器1410可以包括是一个或多个处理器,例如包括一个或多个CPU,在处理器是一个CPU的情况下,该CPU可以是单核CPU,也可以是多核CPU。
该收发器1420用于发送和接收数据和/或信号,以及接收数据和/或信号。该收发器可以包括发射器和接收器,发射器用于发送数据和/或信号,接收器用于接收数据和/或信号。
该存储器1430包括但不限于是RAM、ROM、EPROM、CD-ROM,该存储器1430用于存储相关指令及数据。
存储器1430用于存储网络设备的程序代码和数据,可以为单独的器件或集成在处理器1410中。
具体地,所述处理器1410用于控制收发器与终端设备进行信息传输。具体可参见方法实施例中的描述,在此不再赘述。
可以理解的是,图14仅仅示出了网络设备的简化设计。在实际应用中,网络设备还可以分别包含必要的其他元件,包含但不限于任意数量的收发器、处理器、控制器、存储器等,而所有可以实现本申请的网络设备都在本申请的保护范围之内。
在一种可能的设计中,网络设备1400可以被替换为芯片装置,例如可以为可用于网络设备中的通信芯片,用于实现网络设备中处理器1410的相关功能。该芯片装置可以为实现相关功能的现场可编程门阵列,专用集成芯片,系统芯片,中央处理器,网络处理器,数字信号处理电路,微控制器,还可以采用可编程控制器或其他集成芯片。该芯片中,可选的可以包括一个或多个存储器,用于存储程序代码,当所述代码被执行时,使得处理器实现相应的功能。
为了便于读者理解本申请,下面,再举出一些本申请提供的方法和装置的实施例。下述实施例和上述实施例相关的部分可以相互参考进行理解。应理解,下述中的基站可以是上文中的网络设备,用户设备可以是上文中的终端设备。
1、一种盲授权传输方法,用于用户设备,所述方法包括:
接收基站发送的第一盲授权消息,所述第一盲授权消息中至少包含第一上行数据传输资源指示信息;
在第一传输周期的所述第一上行数据传输资源传输第一数据;
若正确传输所述第一数据,在第二传输周期的所述第一上行数据传输资源传输第二数据;或,
若未正确传输所述第一数据,在第二传输周期的所述第一上行数据传输资源重传所述第一数 据。
所述盲授权传输配置消息可以是无线资源控制层的配置消息。所述盲授权扰码可以是所述用户设备的一种无线网络临时标识即B-RNTI,所述B-RNTI是不同于现有规范中的C-RNTI、SPS-RNTI的一种临时标识,用于识别所接收到的盲授权消息是针对盲授权传输进行授权的盲授权消息。
所述盲授权消息可以是现有规范中的盲授权消息,使用所述盲授权扰码加扰传输。
所述使用所述盲授权扰码接收基站发送的第一盲授权消息之前还包括,进行免授权数据传输,在免授权传输过程中或免授权传输结束后,检测是否存在盲授权消息,若存在所述第一盲授权消息,若所述免授权传输还在进行,可以终止所述免授权传输,使用盲授权消息中授权的上行数据传输资源进行授权传输。
所述盲授权消息中授权的上行数据传输资源,基站每次在此传输资源上检测到所述用户设备的传输时,可以为所述用户设备继续保留一定的时间,基站可以在超过一定的时间持续未在此传输资源上检测到所述用户设备的传输后,释放该资源。
所述第一传输周期并不限定于所述用户设备在收到所述第一盲授权消息后的第一次传输对应的周期。
所述第一数据并不限定于所述用户设备在收到所述第一盲授权消息后的第一次传输的数据。
2、根据方法1所述的方法,所述方法还包括:
在使用所述第一上行数据传输资源传输数据时,使用所述第一上行数据传输资源中的解调参考信号传输资源传输不同的解调参考信号序列指示是否还有更多数据,若没有更多数据则在所述解调参考信号传输资源传输上传输第一解调参考信号序列,以便所述基站收到所述第一数据后释放所述第一上行数据传输资源,若还有更多数据则在所述解调参考信号传输资源传输第二解调参考信号序列,以便所述基站收到所述第一数据后保留所述第一上行数据传输资源。
所述解调参考信号用于接收端作为参考信号以接收其它传输资源上的传输信号。解调参考信号传输资源在数据传输资源中的相对固定位置,不需要基站额外指示解调参考信号传输资源的位置。
解调参考信号传输资源可以传输不同的简单的序列,不同的序列可以用于指示不同的含义。所述用户设备在任一次使用任一盲授权消息授权的上行数据传输资源传输上行数据时,都使用正确的解调参考信号序列以向基站指示是否还有更多数据。
本方法并不限定所述用户设备如何获得解调参考信号序列的配置,事实上可以在系统中规定默认的第一解调参考信号序列和第二解调参考信号序列。
用户设备在传输数据时指示是否还有更多数据的好处是有利于基站在获知用户设备无更多数据时可以立即释放盲授权消息中授权的上行数据传输资源,提高资源利用率。
3、根据方法2所述的方法,所述盲授权传输配置消息或所述第一盲授权消息中还包含所述第一解调参考信号序列和/或所述第二解调参考信号序列信息。
即所述解调参考信号序列的配置信息可以携带在所述盲授权传输配置消息中,也可以携带在所述第一盲授权消息。所述解调参考信号序列的配置只需要进行一次,不需要每次都在盲授权消息中携带解调参考信号序列的配置信息,所以在盲授权传输配置消息中携带解调参考信号序列的配置信息是优选方案。
所述解调参考信号序列的配置信息可以同时包含两个解调参考信号序列,也可以只包含一个, 例如另一个已经在其它配置信息中包含。
4、根据方法1所述的方法,所述方法还包括:
在使用所述第一上行数据传输资源传输数据时,使用所述第一上行数据传输资源中的解调参考信号传输资源传输不同的解调参考信号序列指示是否需要更大上行数据传输资源,若不需要更大上行数据传输资源则在所述解调参考信号传输资源传输第三解调参考信号序列,若需要更大上行数据传输资源则在所述解调参考信号传输资源传输第四解调参考信号序列,以便所述基站分配更大的上行数据传输资源。
参考方法2中描述。不同的解调参考信号序列也可以用于指示是否需要更大上行数据传输资源,以便在还有大量待传输数据时,用现有资源传输数据的同时向基站请求更大资源,以便尽快传完剩余的大量待传输数据。
5、根据方法4所述的方法,所述盲授权传输配置消息或所述第一盲授权消息中还包含所述第三解调参考信号序列和/或所述第四解调参考信号序列信息。
关于解调参考信号序列的配置可参考方法3中的描述。
6、根据方法1所述的方法,所述方法还包括:
在使用所述第一上行数据传输资源传输数据时,使用所述第一上行数据传输资源中的解调参考信号传输资源传输不同的解调参考信号序列指示是否还有更多数据以及是否需要更大上行数据传输资源,若没有更多数据则在所述解调参考信号传输资源传输第五解调参考信号序列,以便所述基站收到所述第一数据后释放所述第一上行数据传输资源,若还有更多数据但不需要更大上行数据传输资源则在所述解调参考信号传输资源传输第六解调参考信号序列,以便所述基站收到所述第一数据后保留所述第一上行数据传输资源,若需要更大上行数据传输资源则在所述解调参考信号传输资源传输第七解调参考信号序列,以便所述基站分配更大的上行数据传输资源。
参考方法2和4中的描述。可以使用更多个不同的解调参考信号序列用于指示多种含义,以便基站知道是否可以立即释放盲授权消息所授权的资源,以提高资源利用效率,以及是否需要为所述用户设备分配更大的上行数据传输资源,以便所述用户设备尽快传完剩余的大量待传输数据。
7、根据方法6所述的方法,所述盲授权传输配置消息或所述第一盲授权消息中还包含所述第五解调参考信号序列和/或所述第六解调参考信号序列和/或所述第七解调参考信号序列信息。
关于解调参考信号序列的配置可参考方法3中的描述。
8、根据方法1所述的方法,所述方法还包括:
在使用所述第一上行数据传输资源传输数据时,使用第一上行控制信息传输资源传输第一指示信息,所述第一指示信息用于指示是否还有更多数据待传输,若没有更多数据则所述第一指示信息取第一值,若还有更多数据则所述第一指示信息取第二值。
所述第一指示信息可以仅包含1比特,其取值可以是所述第一值为“0”、所述第二值为“1”,或相反。
本方法并不限定所述如何获得所述第一上行控制信息传输资源的配置,例如所述第一上行控制信息传输资源可以在系统中的上行控制信道中,所述第一上行控制信息传输资源在所述上行控制信道中的位置可以根据所述第一上行数据传输资源在系统资源中的位置计算获得。所述第一上行控制信息传输资源也可以包含于所述第一上行数据传输资源中,且其在所述第一上行数据传输资源中的位置为默认值。
9、根据方法8所述的方法,所述第一盲授权消息中还包含所述第一上行控制信息传输资源信 息。
也就是说可以显式地获得所述第一上行控制信息传输资源的配置。
10、根据方法1所述的方法,所述方法还包括:
在使用所述第一上行数据传输资源传输数据时,使用第二上行控制信息传输资源传输第二指示信息,所述第二指示信息用于指示是否需要更大上行数据传输资源,若不需要更大上行数据传输资源则所述第二指示信息取第三值,若需要更大上行数据传输资源则所述第二指示信息取第四值。
所述第二指示信息可以仅包含1比特,其取值可以是所述第三值为“0”、所述第四值为“1”,或相反。
本方法并不限定如何获得所述第二上行控制信息传输资源的配置,具体可参考方法8中的描述。
11、根据方法10所述的方法,所述第一盲授权消息中还包含所述第二上行控制信息传输资源信息。
也就是说可以显式地获得所述第二上行控制信息传输资源的配置。
12、根据方法1所述的方法,所述方法还包括:
在使用所述第一上行数据传输资源传输数据时,使用第三上行控制信息传输资源传输第三指示信息,所述第三指示信息用于指示是否还有更多数据待传输和是否需要更大上行数据传输资源,若没有更多数据则所述第三指示信息取第五值,若还有更多数据但不需要更大上行数据传输资源则所述第三指示信息取第六值,若需要更大上行数据传输资源则所述第三指示信息取第七值。
所述第三指示信息可以仅包含2比特,其取值可以是所述第五值为“00”、所述第六值为“01”,所述第七值为“11”,或使用其它的取值组合。
本方法并不限定如何配置所述第三上行控制信息传输资源,具体可参考方法8中的描述。
13、根据方法12所述的方法,所述第一盲授权消息中还包含所述第三上行控制信息传输资源信息。
也就是说可以显式地获得所述第三上行控制信息传输资源的配置。
14、根据方法1-13任一所述的方法,所述方法还包括:
若在使用所述第一上行数据传输资源传输数据时指示需要更大上行数据传输资源,则:
接收所述基站发送的第二盲授权消息,所述第二盲授权消息中至少包含第二上行数据传输资源指示信息,所述第二上行数据传输资源大于所述第一上行数据传输资源;
在第三传输周期的所述第二上行数据传输资源上传输第三数据;
若正确传输所述第三数据,在第四传输周期的所述第二上行数据传输资源传输第四数据,或结束传输;或,
若未正确传输所述第三数据,在第四传输周期的所述第二上行数据传输资源重传所述第三数据。
所述指示需要更大上行数据传输资源的指示方法,并不限于使用解调参考信息序列或上行控制信息指示方法。
所述所述第二上行数据传输资源大于所述第一上行数据传输资源,具体可以是,所述第二上行数据传输资源是所述第一上行数据传输资源的二倍。
所述第二上行数据传输资源可以包含所述第一上行数据传输资源,则所述第二上行数据传输 资源指示信息具体可以是指示所述第二上行数据传输资源中除了所述第一上行数据传输资源的增量部分。
所述第三数据可以包含在使用所述第一上行数据传输资源传输时未成功传输的数据例如所述第二数据。
15、根据方法1-14任一所述的方法,所述接收基站发送的第一盲授权消息之前还包括:
接收基站发送的盲授权传输配置消息,所述盲授权传输配置消息中至少包含盲授权扰码信息,所述盲授权扰码用于接收盲授权消息时通过所述盲授权扰码识别所接收的消息是所述盲授权消息。
所述盲授权消息如所述第一盲授权消息或第二盲授权消息。
16、一种盲授权传输方法,用于基站,所述方法包括:
向用户设备发送第一盲授权消息,所述第一盲授权消息中至少包含第一上行数据传输资源指示信息;
在第一传输周期的所述第一上行数据传输资源接收所述用户设备传输的第一数据;
若正确接收所述第一数据,在第二传输周期的所述第一上行数据传输资源接收所述用户设备传输的第二数据;或,
若未正确接收所述第一数据,在第二传输周期的所述第一上行数据传输资源重新接收所述用户设备重传的所述第一数据。
所述盲授权传输配置消息可以是无线资源控制层的配置消息。所述盲授权扰码可以是分配给所述用户设备的一种无线网络临时标识即B-RNTI,所述B-RNTI是不同于现有规范中基站分配给用户设备的C-RNTI、SPS-RNTI的一种临时标识,用于指示所发送的盲授权消息是针对盲授权传输进行授权的盲授权消息。
所述盲授权消息可以是现有规范中的盲授权消息,使用所述盲授权扰码加扰传输。
所述使用所述盲授权扰码向所述用户设备发送第一盲授权消息之前还包括,接收所述用户设备的免授权数据传输,在免授权传输过程中或免授权传输结束后,若未能正确接收所述用户设备免授权传输的数据,向所述用户设备发送所述第一盲授权消息。
所述盲授权消息中授权的上行数据传输资源,若在此传输资源上检测到所述用户设备的传输时,可以为所述用户设备继续保留一定的时间,可以在超过一定的时间持续未在此传输资源上检测到所述用户设备的传输后,释放该资源。
所述第一传输周期并不限定于向所述用户设备发送所述第一盲授权消息后第一次在所述第一上行数据传输资源上检测到传输时对应的传输周期。
所述第一数据并不限定于向所述用户设备发送所述第一盲授权消息后第一次在所述第一上行数据传输资源上检测到的传输所承载的数据。
17、根据放16所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,获得所述用户设备在所述第一上行数据传输资源中的解调参考信号传输资源上传输的解调参考信号序列,若所述解调参考信号序列为第一解调参考信号序列,表示所述用户设备没有更多数据,在正确接收所述第一数据后释放所述第一上行数据传输资源,若所述解调参考信号序列为第二解调参考信号序列,表示所述用户设备还有更多数据,在正确接收所述第一数据后保留所述第一上行数据传输资源。
可参考方法2中关于解调参考信号的描述。
本方法并不限定如何配置所述用户设备使用的解调参考信号序列,事实上可以在系统中规定 默认的第一解调参考信号序列和第二解调参考信号序列。
使用户设备在传输数据时指示是否还有更多数据的好处是有利于基站在获知用户设备无更多数据时可以立即释放盲授权消息中授权的上行数据传输资源,提高资源利用率。
18、根据方法17所述的方法,所述盲授权传输配置消息或所述第一盲授权消息中还包含所述第一解调参考信号序列和/或所述第二解调参考信号序列信息。
可参考方法3中的描述。
19、根据方法16所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,获得所述用户设备在所述第一上行数据传输资源中的解调参考信号传输资源上传输的解调参考信号序列,若所述解调参考信号序列为第三解调参考信号序列,表示所述用户设备不需要更大上行数据传输资源,若所述解调参考信号序列为第四解调参考信号序列,表示所述用户设备需要更大的上行数据传输资源,则为所述用户设备分配更大的上行数据传输资源。
可参考方法4中的描述。
20、根据方法19所述的方法,所述盲授权传输配置消息或所述第一盲授权消息中还包含所述第三解调参考信号序列和/或所述第四解调参考信号序列信息。
关于解调参考信号序列的配置可参考方法3中的描述。
21、根据方法16所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,获得所述用户设备在所述第一上行数据传输资源中的解调参考信号传输资源上传输的解调参考信号序列,若所述解调参考信号序列为第五解调参考信号序列,表示所述用户设备没有更多数据,在正确接收所述第一数据后释放所述第一上行数据传输资源,若所述解调参考信号序列为第六解调参考信号序列,表示所述用户设备还有更多数据但不需要更大上行数据传输资源,若所述解调参考信号序列为第七解调参考信号序列,表示所述用户设备需要更大的上行数据传输资源,则为所述用户设备分配更大的上行数据传输资源。
可参考方法6中的描述。
22、根据方法21所述的方法,所述盲授权传输配置消息或所述第一盲授权消息中还包含所述第五解调参考信号序列和/或所述第六解调参考信号序列和/或所述第七解调参考信号序列信息。
可参考方法3中的描述。
23、根据方法16所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,获得所述用户设备在第一上行控制信息传输资源传输的第一指示信息,所述第一指示信息指示所述用户设备是否还有更多数据待传输,若所述第一指示信息取第一值,表示所述用户设备没有更多数据,则释放所述第一上行数据传输资源,若所述第一指示信息取第二值,表示所述用户设备还有更多数据,则保留所述第一上行数据传输资源。
所述第一指示信息可以仅包含1比特,其取值可以是所述第一值为“0”、所述第二值为“1”,或相反。
本方法并不限定如何配置所述第一上行控制信息传输资源,例如所述第一上行控制信息传输资源可以在系统中的上行控制信道中,所述第一上行控制信息传输资源在所述上行控制信道中的位置可以根据所述第一上行数据传输资源在系统资源中的位置计算获得。所述第一上行控制信息 传输资源也可以包含于所述第一上行数据传输资源中,且其在所述第一上行数据传输资源中的位置为默认值。
24、根据方法23所述的方法,所述第一盲授权消息中还包含所述第一上行控制信息传输资源信息。
也就是说可以显式地配置所述第一上行控制信息传输资源。
25、根据方法16所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,获得所述用户设备在第二上行控制信息传输资源传输的第二指示信息,所述第二指示信息指示所述用户设备是否需要更大的上行数据传输资源,若所述第二指示信息取第三值,表示所述用户设备不需要更大上行数据传输资源,若所述第二指示信息取第四值,表示所述用户设备需要更大上行数据传输资源,则为所述用户设备分配更大的上行数据传输资源。
所述第二指示信息可以仅包含1比特,其取值可以是所述第三值为“0”、所述第四值为“1”,或相反。
本方法并不限定如何配置所述第二上行控制信息传输资源,具体可参考方法23中的描述。
26、根据方法25所述的方法,所述第一盲授权消息中还包含所述第二上行控制信息传输资源信息。
也就是说可以显式地配置所述第二上行控制信息传输资源。
27、根据方法16所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,获得所述用户设备在第三上行控制信息传输资源传输的第三指示信息,所述第三指示信息指示所述用户设备是否还有更多数据待传输和是否需要更大上行数据传输资源,若所述第三指示信息取第五值,表示所述用户设备没有更多数据,则释放所述第一上行数据传输资源,若所述第三指示信息取第六值,表示所述用户设备还有更多数据但不需要更大上行数据传输资源,若所述第三指示信息取第七值,表示所述用户设备需要更大上行数据传输资源,则为所述用户设备分配更大的上行数据传输资源。
所述第三指示信息可以仅包含2比特,其取值可以是所述第五值为“00”、所述第六值为“01”,所述第七值为“11”,或使用其它的取值组合。
本方法并不限定如何配置所述第三上行控制信息传输资源,具体可参考方法23中的描述。
28、根据方法27所述的方法,所述第一盲授权消息中还包含所述第三上行控制信息传输资源信息。
也就是说可以显式地配置所述第三上行控制信息传输资源。
29、根据方法16-28任一所述的方法,所述方法还包括:
在接收所述用户设备在所述第一上行数据传输资源传输的数据时,若获知所述用户设备需要更大上行数据传输资源,则:
向所述用户设备发送第二盲授权消息,所述第二盲授权消息中至少包含第二上行数据传输资源指示信息,所述第二上行数据传输资源大于所述第一上行数据传输资源;
在第三传输周期接收所述用户设备在所述第二上行数据传输资源上传输的第三数据;
若正确接收所述第三数据,在第四传输周期接收所述用户设备在所述第二上行数据传输资源传输的第四数据;或,
若未正确接收所述第三数据,在第四传输周期接收所述用户设备在所述第二上行数据传输资 源重传的所述第三数据。
所述获知所述用户设备需要更大上行数据传输资源的方法,并不限于获得解调参考信息序列或接收上行控制信息指示的方法。
所述所述第二上行数据传输资源大于所述第一上行数据传输资源,具体可以是,所述第二上行数据传输资源是所述第一上行数据传输资源的二倍。
所述第二上行数据传输资源可以包含所述第一上行数据传输资源,则所述第二上行数据传输资源指示信息具体可以是指示所述第二上行数据传输资源中除了所述第一上行数据传输资源的增量部分。
所述第三数据可以包含接收所述用户设备在所述第一上行数据传输资源上的传输时未成功接收的数据例如所述第二数据。
30、根据方法16-29任一所述的方法,所述向用户设备发送第一盲授权消息之前还包括:
向所述用户设备发送盲授权传输配置消息,所述盲授权传输配置消息中至少包含盲授权扰码信息,所述盲授权扰码用于向所述用户设备发送盲授权消息时使用所述盲授权扰码加扰所发送的盲授权消息,以使所述用户设备在接收所述基站发送的盲授权消息时通过所述盲授权扰码识别所接收的消息为所述盲授权消息。
所述盲授权消息如所述第一盲授权消息或所述第二盲授权消息。
31、一种盲授权传输方法,用于用户设备,所述方法包括:
所述用户设备向基站免授权传输第一数据;
所述用户设备接收所述基站发送的第一授权消息,所述第一授权消息指示所述免授权传输失败,所述第一授权消息中包含第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述用户设备传输一个资源请求消息;
所述用户设备在所述第一传输资源上向所述基站发送资源请求消息,所述资源请求消息中包含资源需求信息,所述资源需求信息指示所述用户设备第二数据的大小或传输所述第二数据需要的传输资源大小;
所述用户设备接收所述基站发送的第二授权消息,所述第二授权消息中包含第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述用户设备传输所述第二数据;
所述用户设备在所述第二传输资源上向所述基站发送所述第二数据。
所述资源请求消息可以是现有技术中的缓冲状态报告BSR消息。所述资源请求消息的长度固定,因此所述基站可以明确知道应该授权多大的资源给所述用户设备传输所述资源请求消息。
所述第一授权消息和所述第二授权消息可以是同一种类型的授权消息,也可以是不同类型的授权消息。
32、根据方法31所述的方法,所述第二数据包含所述第一数据。
所述第二数据包含所述第一数据具体是指,所述第二数据就是所述第一数据,或者所述第一数据是所述第二数据的一部分。以下任意一处涉及一个数据包含另一个数据的描述其具体含义与此类同,不再赘述。
33、根据方法31所述的方法,所述第一传输资源的资源量大于传输所述资源请求消息所需资源量,则所述用户设备在所述第一传输资源上向所述基站发送资源请求消息具体包括:
所述用户设备在所述第一传输资源上向所述基站发送第三数据和所述资源请求消息,所述第 三数据是所述第一数据的一部分或全部,或所述第三数据包含所述第一数据,则所述第二数据包含所述第一数据,或所述第二数据不包含所述第三数据但包含所述第二数据中除所述第三数据之外的其它部分。
所述第一传输资源的资源量大于传输所述资源请求消息所需资源量具体包括:所述用户设备与所述基站预先协商一个盲授权资源量,当所述用户设备免授权传输失败时,所述基站向所述用户设备授权的所述第一传输资源的资源量为所述盲授权资源量加上传输一个资源请求消息所需要的资源量。或者,所述基站根据接收所述用户设备免授权传输所述第一数据时的情况确定盲授权资源量,例如根据检测到的所述用户设备在免授权传输时使用的免授权传输资源单元数量确定所述盲授权资源量。还可以有其它的方法确定所述盲授权资源量,本发明不限定基站如何确定盲授权资源量。
34、根据方法31所述的方法,所述第一授权消息中还包含第三资源指示信息,所述第三资源指示信息指示第三传输资源,则所述用户设备在所述第一传输资源上向所述基站发送资源请求消息的同时还包括:
所述用户设备在所述第三传输资源上向所述基站发送第四数据,所述第四数据是所述第一数据的一部分或全部,则所述第二数据包含所述第一数据,或所述第二数据不包含所述第四数据但包含所述第二数据中除所述第四数据之外的其它部分。
所述用户设备在所述第一传输资源上向所述基站发送资源请求消息的同时在所述第三传输资源上向所述基站发送第四数据具体是指,所述用户设备在同一个传输周期中向所述基站传输所述资源请求消息和第四数据。
35、根据方法31-34任一所述的方法,所述第一授权消息和所述第二授权消息为盲授权消息,则所述用户设备接收基站发送的第一授权消息之前还包括:
所述用户设备接收所述基站发送的盲授权传输配置消息,所述盲授权传输配置消息中至少包含盲授权扰码信息,所述含盲授权扰码用于所述用户设备接收所述盲授权消息。
所述盲授权消息如所述第一授权消息或第二授权消息。
36、一种盲授权传输方法,用于基站,所述方法包括:
所述基站接收用户设备免授权传输的第一数据;
所述基站向所述用户设备发送第一授权消息,所述第一授权消息指示所述免授权传输失败,所述第一授权消息中包含第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述用户设备传输一个资源请求消息;
所述基站在所述第一传输资源接收所述用户设备发送的资源请求消息,所述资源请求消息中包含资源需求信息,所述资源需求信息指示所述用户设备第二数据的大小或传输所述第二数据需要的传输资源大小;
所述基站向所述用户设备发送第二授权消息,所述第二授权消息中包含第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述用户设备传输所述第二数据;
所述基站在所述第二传输资源上接收所述用户设备发送的所述第二数据。
关于资源请求消息可以参考方法31中的描述。
所述第一授权消息和所述第二授权消息可以是同一种类型的授权消息,也可以是不同类型的授权消息。
37、根据方法36所述的方法,所述第二数据包含所述第一数据。
38、根据方法36所述的方法,所述第一传输资源的资源量大于传输所述资源请求消息所需资源量,则所述基站在所述第一传输资源接收所述用户设备发送的资源请求消息具体包括:
所述基站在所述第一传输资源上接收用户设备发送的第三数据和所述资源请求消息,所述第三数据是所述第一数据的一部分或全部,则所述第二数据包含所述第一数据,或所述第二数据不包含所述第三数据但包含所述第二数据中除所述第三数据之外的其它部分。
关于第一传输资源的资源量可以参考方法33中的描述。
39、根据方法36所述的方法,所述第一授权消息中还包含第三资源指示信息,所述第三资源指示信息指示第三传输资源,则所述基站在所述第一传输资源接收所述用户设备发送的资源请求消息的同时还包括:
所述基站在所述第三传输资源上接收所述用户设备发送的第四数据,所述第四数据是所述第一数据的一部分或全部,则所述第二数据包含所述第一数据,或所述第二数据不包含所述第四数据但包含所述第二数据中除所述第四数据之外的其它部分。
所述基站在所述第一传输资源接收所述用户设备发送的资源请求消息的同时在在所述第三传输资源上接收所述用户设备发送的第四数据具体是指,所述基站同一个传输周期中接收所述用户设备发送的所述资源请求消息和第四数据。
40、根据方法36-39任一所述的方法,所述第一授权消息和所述第二授权消息为盲授权消息,则所述基站接收用户设备免授权传输的第一数据之前还包括:
所述基站向所述用户设备发送盲授权传输配置消息,所述盲授权传输配置消息中至少包含盲授权扰码信息,所述含盲授权扰码用于向所述用户设备发送所述盲授权消息。
所述盲授权消息如所述第一授权消息或第二授权消息。
41.一种用户设备,包括:
存储器,用于存储指令;
处理器,用于调用所述存储器中的指令,执行上述方法1-15和31-35任一所述的方法。
42.一种基站,包括:
存储器,用于存储指令;
处理器,用于调用所述存储器中的指令,执行上述方法16-30和36-40任一所述的方法。
43.一种用户设备,包括:处理器,存储器和无线收发机;
所述无线收发机,用于接收和发送数据,与基站实现无线通信;
所述存储器用于存储指令;
所述处理器用于执行所述存储器中的所述指令,执行如方法1-15和31-35任一所述的方法。
44.一种基站,包括:处理器,存储器和无线收发机;
所述无线收发机,用于接收和发送数据,与用户设备实现无线通信;
所述存储器用于存储指令;
所述处理器用于执行所述存储器中的所述指令,执行如方法16-30和36-40任一所述的方法。
45、一种用户设备,被配置为执行如方法1-15和31-35任一所述的方法。
46、一种基站,被配置为执行如方法16-30和36-40任一所述的方法。
47、一种计算机程序产品,包括计算机程序,该计算机程序在某一计算机上执行时,将会使所述计算机实现方法1-15和31-35任一所述的方法。
48、一种计算机程序产品,包括计算机程序,该计算机程序在某一计算机上执行时,将会使所述计算机实现方法16-30和36-40任一所述的方法。
49、一种计算机程序,该计算机程序在某一计算机上执行时,将会使所述计算机实现方法1-15和31-35任一所述的方法。
50、一种计算机程序,该计算机程序在某一计算机上执行时,将会使所述计算机实现方法16-30和36-40任一所述的方法。
51、一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该计算机程序在某一计算机上执行时,将会使所述计算机实现权利要求1-15和31-35任一所述的方法。
52、一种计算机可读存储介质,其上存储有计算机程序,其特征在于,该计算机程序在某一计算机上执行时,将会使所述计算机实现权利要求16-30和36-40任一所述的方法。
53、一种通信系统,包括如方法1-15和31-35任一所述的用户设备和如方法16-30和36-40任一所述的基站。
54、一种芯片,包括:处理模块与通信接口,所述处理模块用于执行方法1-15和31-35中任一项所述的方法。
55、根据方法54所述的芯片,所述芯片还包括存储模块(如,存储器),所述存储模块用于存储指令,所述处理模块用于执行所述存储模块存储的指令,并且对所述存储模块中存储的指令的执行使得所述处理模块执方法1-15和31-35中任一项所述的方法。
56、一种芯片,包括:处理模块与通信接口,所述处理模块用于执行方法16-30和36-40中任一项所述的方法。
57、根据方法56所述的芯片,所述芯片还包括存储模块(如,存储器),所述存储模块用于存储指令,所述处理模块用于执行所述存储模块存储的指令,并且对所述存储模块中存储的指令的执行使得所述处理模块执行方法16-30和36-40中任一项所述的方法。
本申请提供了一种装置(可以为通信芯片),其中存储有指令,当其在设备(如终端设备或网络设备)上运行时,使得该设备执行上述各方法实施例中的一种方法。
本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,本申请中各方法实施例之间相关部分可以相互参考,上述描述的系统、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的系统、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以 根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。
所述功能如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (64)

  1. 一种传输方法,其特征在于,包括:
    终端设备接收网络设备发送的第一授权消息,所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
    所述终端设备在所述第一传输资源上向所述网络设备发送第二数据,所述第二数据为所述第一数据的部分或全部。
  2. 如权利要求1所述的方法,其特征在于,所述终端设备多次连续使用所述第一传输资源,包括:
    在所述终端设备在发送所述第二数据之后的预定时间内未接收到所述网络设备发送的肯定应答ACK的情况下,或,在所述终端设备在发送所述第二数据之后的预定时间内接收到所述网络设备发送的否定应答NACK的情况下,所述终端设备在所述第一传输资源上重传所述第二数据。
  3. 如权利要求1或2所述的方法,其特征在于,所述终端设备多次连续使用所述第一传输资源,包括:
    在所述第二数据为所述第一数据的部分的情况下,若所述终端设备在发送所述第二数据之后的预定时间内接收到所述网络设备发送的肯定应答ACK,则所述终端设备在所述第一传输资源上向所述网络设备发送第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
  4. 如权利要求1至3中任一项所述的方法,其特征在于,所述第二数据通过第一数据帧携带,所述第一数据帧还携带第一指示信息,所述第一指示信息用于指示所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  5. 如权利要求4所述的方法,其特征在于,所述第一指示信息为在所述第一传输资源中的解调参考信号DMRS资源上发送的DMRS序列;
    其中,若所述第一指示信息为第一DMRS序列,所述第一指示信息用于指示所述终端设备在传输完所述第二数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
    若所述第一指示信息为第二DMRS序列,所述第一指示信息用于指示所述终端设备在传输完所述第二数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  6. 如权利要求1至5中任一项所述的方法,其特征在于,所述第二数据通过第二数据帧携带,所述第二数据帧还携带第二指示信息,所述第二指示信息用于指示所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
  7. 如权利要求6所述的方法,其特征在于,所述第二指示信息为在所述第一传输资源中的解调参考信号DMRS资源上发送的DMRS序列;
    其中,若所述第二指示信息为第三DMRS序列,所述第二指示信息用于指示所述终端设备不需要不同于所述第一传输资源的其他传输资源;
    若所述第二指示信息为第四DMRS序列,所述第二指示信息用于指示所述终端设备需要不同于所述第一传输资源的其他传输资源。
  8. 如权利要求6或7所述的方法,其特征在于,若所述第二指示信息指示所述终端设备需要不同于所述第一传输资源的其他传输资源,在所述终端设备在所述第一传输资源上向所述网络设 备发送第二数据之后,所述方法还包括:
    所述终端设备接收所述网络设备发送的第二授权消息,所述第二授权消息用于指示第二传输资源;
    所述终端设备根据所述第二授权消息,使用所述第二传输资源向所述网络设备发送第四数据,所述第四数据包括所述第一数据的部分或全部。
  9. 如权利要求1至8中任一项所述的方法,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述终端设备接收网络设备发送的第一授权消息,包括:
    所述终端设备采用所述第一标识对所述网络设备发送的至少一个下行消息的CRC进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  10. 如权利要求1至8中任一项所述的方法,其特征在于,所述第一授权消息还包括第三指示信息,所述第三指示信息用于指示所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  11. 如权利要求9所述的方法,其特征在于,在所述终端设备接收网络设备发送的第一授权消息之前,所述方法还包括:
    所述终端设备接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
  12. 一种传输方法,其特征在于,包括:
    网络设备向终端设备发送第一授权消息,所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
    所述网络设备在所述第一传输资源上检测所述终端设备发送的第二数据,所述第二数据为所述第一数据的部分或全部。
  13. 如权利要求12所述的方法,其特征在于,所述方法还包括:
    若所述网络设备未正确接收所述终端设备发送的所述第二数据,所述网络设备向所述终端设备发送否定应答NACK;
    所述网络设备在所述第一传输资源上接收所述终端设备重传的所述第二数据。
  14. 如权利要求12或13所述的方法,其特征在于,所述第二数据为所述第一数据的部分;
    所述方法还包括:
    若所述网络设备正确接收所述终端设备发送的所述第二数据,所述网络设备向所述终端设备发送肯定应答ACK;
    所述网络设备在所述第一传输资源上检测所述终端设备发送的第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
  15. 如权利要求12至14中任一项所述的方法,其特征在于,所述方法还包括:
    所述网络设备检测第一数据帧所携带的第一指示信息,所述第一数据帧还携带所述第二数据;
    所述网络设备根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  16. 如权利要求15所述的方法,其特征在于,所述第一指示信息为在所述第一传输资源中的 解调参考信号DMRS资源上发送的DMRS序列;
    其中,所述网络设备根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输,包括:
    若所述网络设备在所述第一传输资源上检测到第一DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
    若所述网络设备在所述第一传输资源上检测到第二DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  17. 如权利要求12至16中任一项所述的方法,其特征在于,所述方法还包括:
    所述网络设备检测第二数据帧所携带的第二指示信息,所述第二数据帧还携带所述第二数据;
    所述网络设备根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
  18. 如权利要求17所述的方法,其特征在于,所述第二指示信息为在所述第一传输资源中的解调参考信号DMRS资源上发送的DMRS序列;
    其中,所述网络设备根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源,包括:
    若所述网络设备在所述第一传输资源上检测到第三DMRS序列,所述网络设备确定所述终端设备不需要不同于所述第一传输资源的其他传输资源;
    若所述网络设备在所述第一传输资源上检测到第四DMRS序列,所述网络设备确定所述终端设备需要不同于所述第一传输资源的其他传输资源。
  19. 如权利要求17或18所述的方法,其特征在于,若所述网络设备确定所述终端设备需要不同于所述第一传输资源的其他传输资源,所述方法还包括:
    所述网络设备向所述终端设备发送第二授权消息,所述第二授权消息用于指示第二传输资源;
    所述网络设备在所述第二传输资源上检测所述终端设备发送的第四数据。
  20. 如权利要求12至19中任一项所述的方法,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  21. 如权利要求12至19中任一项所述的方法,其特征在于,所述第一授权消息还包括第三指示信息,所述第三指示信息用于指示所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  22. 如权利要求19所述的方法,其特征在于,在网络设备向终端设备发送第一授权消息之前,所述方法还包括:
    所述网络设备向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
  23. 一种终端设备,其特征在于,包括:
    接收单元,用于接收网络设备发送的第一授权消息,所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
    发送单元,用于在所述第一传输资源上向所述网络设备发送第二数据,所述第二数据为所述第一数据的部分或全部。
  24. 如权利要求23所述的终端设备,其特征在于,所述发送单元还用于:
    在所述发送单元在发送所述第二数据之后的预定时间内,所述接收单元未接收到所述网络设备发送的肯定应答ACK的情况下,或,在所述发送单元在发送所述第二数据之后的预定时间内,所述接收单元接收到所述网络设备发送的否定应答NACK的情况下,在所述第一传输资源上重传所述第二数据。
  25. 如权利要求23或24所述的终端设备,其特征在于,所述发送单元还用于:
    在所述第二数据为所述第一数据的部分的情况下,若所述发送单元在发送所述第二数据之后的预定时间内,所述接收单元接收到所述网络设备发送的肯定应答ACK,在所述第一传输资源上向所述网络设备发送第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
  26. 如权利要求23至25中任一项所述的终端设备,其特征在于,所述第二数据通过第一数据帧携带,所述第一数据帧还携带第一指示信息,所述第一指示信息用于指示所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  27. 如权利要求26所述的终端设备,其特征在于,所述第一指示信息为在所述第一传输资源中的调制解调参考信号DMRS资源上发送的DMRS序列;
    其中,若所述第一指示信息为第一DMRS序列,指示所述终端设备在传输完所述第二数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
    若所述第一指示信息为第二DMRS序列,指示所述终端设备在传输完所述第二数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  28. 如权利要求23至27中任一项所述的终端设备,其特征在于,所述第二数据通过第二数据帧携带,所述第二数据帧还携带第二指示信息,所述第二指示信息用于指示所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
  29. 如权利要求28所述的终端设备,其特征在于,所述第二指示信息为在所述第一传输资源中的调制解调参考信号DMRS资源上发送的DMRS序列;
    其中,若所述第二指示信息为第三DMRS序列,指示所述终端设备不需要不同于所述第一传输资源的其他传输资源;
    若所述第二指示信息为第四DMRS序列,指示所述终端设备需要不同于所述第一传输资源的其他传输资源。
  30. 如权利要求28或29所述的终端设备,其特征在于,若所述第二指示信息指示所述终端设备需要不同于所述第一传输资源的其他传输资源,所述接收单元还用于:
    接收所述网络设备发送的第二授权消息,所述第二授权消息用于指示第二传输资源;
    所述发送单元还用于:
    根据所述第二授权消息,使用所述第二传输资源向所述网络设备发送第四数据,所述第四数据包括所述第一数据的部分或全部。
  31. 如权利要求23至30中任一项所述的终端设备,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述接收单元用于接收网络设备发送的第一授权消息包括:
    所述接收单元用于采用所述第一标识对所述网络设备发送的至少一个下行消息的CRC进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  32. 如权利要求23至30中任一项所述的终端设备,其特征在于,所述第一授权消息包括第三指示信息,所述第三指示信息用于指示所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  33. 如权利要求31所述的终端设备,其特征在于,所述接收单元在接收所述网络设备发送的所述第一授权消息之前,还用于:
    接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
  34. 一种网络设备,其特征在于,包括:
    发送单元,用于向终端设备发送第一授权消息,所述第一授权消息为所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括资源指示信息,所述资源指示信息用于指示第一传输资源,所述第一传输资源用于所述终端设备多次连续使用以传输所述第一数据;
    接收单元,用于在所述第一传输资源上检测所述终端设备发送的第二数据,所述第二数据为所述第一数据的部分或全部。
  35. 如权利要求34所述的网络设备,其特征在于,所述发送单元还用于:
    若所述接收单元未正确接收所述终端设备发送的所述第二数据,向所述终端设备发送否定应答NACK;
    所述接收单元还用于,在所述发送单元发送所述NACK后,在所述第一传输资源上接收所述终端设备重传的所述第二数据。
  36. 如权利要求34或35所述的网络设备,其特征在于,所述发送单元还用于:
    若所述接收单元正确接收所述终端设备发送的所述第二数据,向所述终端设备发送肯定应答ACK;
    所述接收单元还用于,在所述发送单元发送所述ACK后,在所述第一传输资源上接收所述终端设备发送的第三数据,所述第三数据为所述第一数据中除所述第二数据之外的数据中的部分或全部。
  37. 如权利要求34至36中任一项所述的网络设备,其特征在于,所述接收单元还用于:
    检测第一数据帧所携带的第一指示信息,所述第一数据帧还携带所述第二数据;
    其中,所述网络设备还包括:
    第一确定单元,用于根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  38. 如权利要求37所述的网络设备,其特征在于,所述第一指示信息为在所述第一传输资源中的调制解调参考信号DMRS资源上发送的DMRS序列;
    其中,所述第一确定单元根据所述第一指示信息确定所述终端设备在传输完所述第二数据后是否还有所述第二数据之外的其他数据需要使用所述第一传输资源传输,包括:
    若所述网络设备在所述第一传输资源上检测到第一DMRS序列,所述网络设备确定所述终端设备在传输完所述第一数据后没有所述第二数据之外的其他数据需要使用所述第一传输资源传输;
    若所述网络设备在所述第一传输资源上检测到第二DMRS序列,所述网络设备确定所述终端 设备在传输完所述第一数据后还有所述第二数据之外的其他数据需要使用所述第一传输资源传输。
  39. 如权利要求34至38中任一项所述的网络设备,其特征在于,所述接收单元还用于:
    检测第二数据帧所携带的第二指示信息,所述第二数据帧还携带所述第二数据;
    其中,所述网络设备还包括:
    第二确定单元,用于根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源。
  40. 如权利要求39所述的网络设备,其特征在于,所述第二指示信息为在所述第一传输资源中的解调参考信号DMRS资源上发送的DMRS序列;
    其中,所述第二确定单元根据所述第二指示信息确定所述终端设备是否需要不同于所述第一传输资源的其他传输资源,包括:
    若所述网络设备在所述第一传输资源上检测到第三DMRS序列,所述网络设备确定所述终端设备不需要不同于所述第一传输资源的其他传输资源;
    若所述网络设备在所述第一传输资源上检测到第四DMRS序列,所述网络设备确定所述终端设备需要不同于所述第一传输资源的其他传输资源。
  41. 如权利要求39或40所述的网络设备,其特征在于,若所述第二确定单元确定所述终端设备需要不同于所述第一传输资源的其他传输资源,所述发送单元还用于:
    所述网络设备向所述终端设备发送第二授权消息,所述第二授权消息用于指示第二传输资源;
    所述接收单元还用于,在所述第二传输资源上接收所述终端设备发送的第四数据。
  42. 如权利要求34至41中任一项所述的网络设备,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  43. 如权利要求34至41中任一项所述的网络设备,其特征在于,所述第一授权消息还包括第三指示信息,所述第三指示信息用于指示所述第一授权消息是所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  44. 如权利要求42所述的网络设备,其特征在于,所述发送单元在向终端设备发送所述第一授权消息之前,还用于:
    向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
  45. 一种传输方法,其特征在于,包括:
    终端设备接收网络设备发送的第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
    所述终端设备在所述第一传输资源上向所述网络设备发送资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
    所述终端设备接收所述网络设备发送的第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述 第二数据;
    所述终端设备在所述第二传输资源上向所述网络设备发送所述第二数据。
  46. 如权利要求45所述的方法,其特征在于,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
    其中,所述终端设备在所述第一传输资源上向所述网络设备发送资源请求消息,包括:
    所述终端设备在所述第一传输资源上向所述网络设备发送第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  47. 如权利要求45所述的方法,其特征在于,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
    其中,在所述终端设备接收所述网络设备发送的第二授权消息之前,所述方法还包括:
    所述终端设备在所述第三传输资源上发送第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  48. 如权利要求45至47中任一项所述的方法,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述终端设备接收所述网络设备发送的第一授权消息,包括:
    所述终端设备采用所述第一标识对所述网络设备发送的至少一个下行消息进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  49. 如权利要求48所述的方法,其特征在于,在所述终端设备接收所述网络设备发送的第一授权消息之前,所述方法还包括:
    所述终端设备接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
  50. 一种传输方法,其特征在于,包括:
    网络设备向终端设备发送第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
    所述网络设备接收所述终端设备在所述第一传输资源上发送的资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
    所述网络设备向所述终端设备发送第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
    所述网络设备接收所述终端设备在所述第二传输资源上发送的所述第二数据。
  51. 如权利要求50所述的方法,其特征在于,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
    其中,所述网络设备接收所述终端设备在所述第一传输资源上发送的资源请求消息,包括:
    所述网络设备接收所述终端设备在所述第一传输资源上发送的第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  52. 如权利要求50所述的方法,其特征在于,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
    其中,在所述网络设备向所述终端设备发送第二授权消息之前,所述方法还包括:
    所述网络设备接收所述终端设备在所述第三传输资源上发送的第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  53. 如权利要求50至52中任一项所述的方法,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  54. 如权利要求53所述的方法,其特征在于,在所述网络设备向终端设备发送第一授权消息之前,所述方法还包括:
    所述网络设备向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
  55. 一种终端设备,其特征在于,包括:
    接收单元,用于接收网络设备发送的第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
    发送单元,用于在所述第一传输资源上向所述网络设备发送资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
    所述接收单元还用于,接收所述网络设备发送的第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
    所述发送单元还用于,在所述第二传输资源上向所述网络设备发送所述第二数据。
  56. 如权利要求55所述的终端设备,其特征在于,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
    其中,所述发送单元用于在所述第一传输资源上向所述网络设备发送资源请求消息包括:
    所述发送单元用于在所述第一传输资源上向所述网络设备发送第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  57. 如权利要求55所述的终端设备,其特征在于,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
    其中,所述发送单元还用于:
    在所述第三传输资源上发送第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  58. 如权利要求55至57中任一项所述的终端设备,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述接收单元用于接收网络设备发送的第一授权消息包括:
    所述接收单元用于采用所述第一标识对所述网络设备发送的至少一个下行消息进行解扰,以接收所述第一授权消息,其中,采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  59. 如权利要求58所述的终端设备,其特征在于,所述接收单元在接收所述网络设备发送的第一授权消息之前,还用于:
    接收所述网络设备发送的传输配置消息,所述传输配置消息包括所述第一标识。
  60. 一种网络设备,其特征在于,包括:
    发送单元,用于向终端设备发送第一授权消息,第一授权消息是所述网络设备在检测到所述终端设备免授权传输第一数据失败后向所述终端设备授权传输资源的消息,所述第一授权消息包括第一资源指示信息,所述第一资源指示信息指示第一传输资源,所述第一传输资源至少用于所述终端设备传输一个资源请求消息;
    接收单元,用于接收所述终端设备在所述第一传输资源上发送的资源请求消息,所述资源请求消息包括资源需求信息,所述资源需求信息指示第二数据的大小或传输所述第二数据需要的传输资源的大小,所述第二数据为所述第一数据的部分或全部;
    所述发送单元还用于,向所述终端设备发送第二授权消息,所述第二授权消息包括第二资源指示信息,所述第二资源指示信息指示第二传输资源,所述第二传输资源用于所述终端设备传输所述第二数据;
    所述接收单元还用于,接收所述终端设备在所述第二传输资源上发送的所述第二数据。
  61. 如权利要求60所述的网络设备,其特征在于,所述第一传输资源的大小大于传输所述资源请求消息所需资源的大小,且所述第二数据为所述第一数据的部分;
    其中,所述接收单元用于接收所述终端设备在所述第一传输资源上发送的资源请求消息包括:
    所述接收单元用于接收所述终端设备在所述第一传输资源上发送的第三数据和所述资源请求消息,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  62. 如权利要求60所述的网络设备,其特征在于,所述第一授权消息还包括第三资源指示信息,所述第三资源指示信息用于指示第三传输资源,所述第三传输资源用于所述终端设备传输所述第一数据的部分或全部;
    其中,所述接收单元还用于:
    在所述发送单元向所述终端设备发送第二授权消息之前,
    接收所述终端设备在所述第三传输资源上发送的第三数据,所述第三数据为所述第一数据中除所述第二数据外的全部数据。
  63. 如权利要求60至62中任一项所述的网络设备,其特征在于,所述第一授权消息中的循环冗余校验码CRC采用第一标识加扰;
    其中,所述网络设备向所述终端设备发送的至少一个下行消息中,CRC采用所述第一标识加扰的下行消息为所述网络设备在检测到所述终端设备免授权传输所述第一数据失败后向所述终端设备授权传输资源的消息。
  64. 如权利要求63所述的网络设备,其特征在于,所述发送单元还用于:
    在向终端设备发送第一授权消息之前,向所述终端设备发送传输配置消息,所述传输配置消息包括所述第一标识。
PCT/CN2018/101696 2017-08-24 2018-08-22 传输方法、终端设备和网络设备 WO2019037736A1 (zh)

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
CN201710737237.1 2017-08-24
CN201710737237 2017-08-24
CN201710806575.6 2017-09-08
CN201710806575 2017-09-08
CN201711479657.0A CN109429353B (zh) 2017-08-24 2017-12-29 传输方法、终端设备和网络设备
CN201711479657.0 2017-12-29

Publications (1)

Publication Number Publication Date
WO2019037736A1 true WO2019037736A1 (zh) 2019-02-28

Family

ID=65439908

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/101696 WO2019037736A1 (zh) 2017-08-24 2018-08-22 传输方法、终端设备和网络设备

Country Status (1)

Country Link
WO (1) WO2019037736A1 (zh)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507486A (zh) * 2015-09-08 2017-03-15 华为技术有限公司 用于上行数据传输的方法、网络设备和终端设备
US20170238321A1 (en) * 2016-02-12 2017-08-17 Futurewei Technologies, Inc. System and Method for Determining a Resource Selection Technique

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106507486A (zh) * 2015-09-08 2017-03-15 华为技术有限公司 用于上行数据传输的方法、网络设备和终端设备
US20170238321A1 (en) * 2016-02-12 2017-08-17 Futurewei Technologies, Inc. System and Method for Determining a Resource Selection Technique

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NOKIA: "Procedure Design for Contention Based Access", 3GPP TSG-RAN WG1 #86 RL-167255, 26 August 2016 (2016-08-26), XP051140603 *

Similar Documents

Publication Publication Date Title
US11184907B2 (en) Method and apparatus for transmitting a transport block in a transmission occasion
JP6934081B2 (ja) ランダムアクセス性能改善のための基地局支援
AU2018213539B2 (en) Data transmission method, terminal device, and network device
CN108029133B (zh) 用于降低lte上行链路传输的时延的方法和设备
JP6006384B2 (ja) アップリンク一次キャリアを選択し再選択する方法および機器
US20180007684A1 (en) Method and apparatus for reducing latency of lte uplink transmissions
KR20210008505A (ko) 스펙트럼 재이용, 전력 절감 및 공존을 위한 채널 액세스 표시
US9178667B2 (en) Method and apparatus for improving a semi-persistent scheduling resource release process in a wireless communication system
US11139928B2 (en) Relating to UL grant free transmissions-configuration and resource bundling
CN114040502A (zh) 用于降低lte上行链路传输的时延的方法和设备
KR20190079700A (ko) 신호 재송신 장치 및 방법 및 통신 시스템
CN113412675A (zh) 通信设备、基础设施设备和方法
JP7074974B2 (ja) アンライセンススペクトル上のアップリンク割り当て
CN109429353B (zh) 传输方法、终端设备和网络设备
US11672014B2 (en) Transmission of a short contention resolution identifier
WO2019037736A1 (zh) 传输方法、终端设备和网络设备
CN113439467B (zh) 在终端和无线网络节点之间的通信
CN110547038B (zh) 通信系统
WO2021062824A1 (zh) 一种信息处理方法和通信设备
WO2018126958A1 (zh) 传输数据的方法、网络设备和终端设备
US11057947B2 (en) Radio network temporary identifier generation
CN112136358B (zh) 用于建立等待时间关键服务的无线通信装置、系统和方法
CN115707118A (zh) 一种资源共享方法及通信装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18848286

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18848286

Country of ref document: EP

Kind code of ref document: A1